Colline del Vento - Vigna e Cantina

Blog Vino - Colline del Vento

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related posts

  1. Hacker Tools For Windows
  2. Hack Tools Mac
  3. Pentest Reporting Tools
  4. Hacking Tools For Windows
  5. Pentest Tools For Android
  6. Pentest Tools Tcp Port Scanner
  7. Hack Tools
  8. Hack Website Online Tool
  9. Pentest Tools Kali Linux
  10. Hacker Security Tools
  11. Hack Website Online Tool
  12. Hacker Tools Hardware
  13. Top Pentest Tools
  14. Hack Tools Github
  15. Hacker Tools Linux
  16. Pentest Tools For Android
  17. Hacker Tools 2019
  18. Hacking Tools For Kali Linux
  19. Pentest Tools Framework
  20. Hacker Tools 2019
  21. Hackrf Tools
  22. Pentest Automation Tools
  23. Hacker Tools Linux
  24. Hacking App
  25. Hacking Tools Pc
  26. Hacker Tools For Windows
  27. Hacking Tools Online
  28. Hacker Tools For Mac
  29. Pentest Tools Free
  30. Hacker Tools List
  31. Hack Rom Tools
  32. Hacking Tools For Mac
  33. Best Hacking Tools 2019
  34. Beginner Hacker Tools
  35. Pentest Tools For Windows
  36. Hak5 Tools
  37. Game Hacking
  38. Top Pentest Tools
  39. Hackrf Tools
  40. Hack Rom Tools
  41. Hack Tool Apk
  42. Hacker
  43. Hacking Tools Windows 10
  44. Hacker Tools Windows
  45. Hacker Search Tools
  46. Nsa Hack Tools
  47. Pentest Tools Nmap
  48. Hacker Tools Apk
  49. Pentest Tools List
  50. Pentest Tools Bluekeep
  51. Hacker Techniques Tools And Incident Handling
  52. Hacking Tools Pc
  53. Tools 4 Hack
  54. What Is Hacking Tools
  55. Hacking Tools For Windows Free Download
  56. Pentest Recon Tools
  57. Hacking Tools For Windows 7
  58. Hacker Tools Linux
  59. Termux Hacking Tools 2019
  60. Hacker Tools Linux
  61. Hacks And Tools
  62. Pentest Tools Android
  63. Hack Tools Online
  64. Easy Hack Tools
  65. Hack Tools Online
  66. Hacking Tools 2020
  67. Pentest Tools For Windows
  68. Pentest Tools Free
  69. New Hacker Tools
  70. Hack Tools Mac
  71. Hacker Security Tools
  72. Hack Tools Online
  73. Easy Hack Tools
  74. Hack Tools 2019
  75. Hacker Tools Free
  76. Tools Used For Hacking
  77. Pentest Tools Apk
  78. Hacker Tools 2019
  79. Hacker Tools Github
  80. Underground Hacker Sites
  81. Hack Website Online Tool
  82. Pentest Tools Website
  83. Hacker Tools Free
  84. Hacking Tools Kit
  85. Hacker Hardware Tools
  86. Hacking Tools Mac
  87. Game Hacking
  88. Hacker Techniques Tools And Incident Handling
  89. What Are Hacking Tools
  90. Hacking Tools Online
  91. Pentest Reporting Tools
  92. Usb Pentest Tools
  93. Pentest Tools Android
  94. Hacker Tools Mac
  95. Best Pentesting Tools 2018
  96. Hacks And Tools
  97. Hacker Tools Github
  98. Pentest Recon Tools
  99. Hacking Tools And Software
  100. Pentest Tools Open Source
  101. Pentest Tools Website
  102. Hacking Tools Free Download
  103. Hack Tool Apk No Root
  104. Hacking Apps
  105. Nsa Hack Tools Download
  106. Pentest Tools
  107. Underground Hacker Sites
  108. Hack Tools 2019
  109. Hacker Tools Software
  110. Pentest Tools For Android
  111. Pentest Box Tools Download
  112. Hacking Tools Software
  113. Pentest Tools Review
  114. Pentest Tools Port Scanner
  115. Black Hat Hacker Tools
  116. Hacking Tools And Software
  117. Hackrf Tools
  118. Bluetooth Hacking Tools Kali
  119. Hacking Tools Github
  120. Hacking Tools Free Download
  121. Hack Tools Online
  122. Bluetooth Hacking Tools Kali
  123. Hackers Toolbox
  124. Hacker Tools For Windows


0 Commenti:

Posta un commento

Iscriviti a Commenti sul post [Atom]

<< Home page


Copyright © 2006 Colline del Vento di Mario Castangia - Sito Ottimizzato per Internet Explorer 6.0 - Best View 1024x768px