Saturday, January 27, 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



More information


  1. Hacking Tools Pc
  2. Hack Tools For Games
  3. Pentest Automation Tools
  4. Easy Hack Tools
  5. Hack Tools For Windows
  6. Nsa Hack Tools Download
  7. Hacker Security Tools
  8. Hacking Tools Github
  9. Github Hacking Tools
  10. Free Pentest Tools For Windows
  11. Pentest Tools Review
  12. Game Hacking
  13. Pentest Tools Alternative
  14. Hacker Tools Free Download
  15. What Is Hacking Tools
  16. Pentest Tools Android
  17. Hacking Tools Kit
  18. Termux Hacking Tools 2019
  19. Pentest Recon Tools
  20. Pentest Tools Tcp Port Scanner
  21. Pentest Tools Alternative
  22. Hacker Tools List
  23. Hack Tools Pc
  24. Nsa Hacker Tools
  25. Hack App
  26. Hacker Tools Linux
  27. Pentest Tools Free
  28. Top Pentest Tools
  29. Top Pentest Tools
  30. Wifi Hacker Tools For Windows
  31. Hacker Tools Software
  32. Termux Hacking Tools 2019
  33. Hack Tools Online
  34. Pentest Tools Url Fuzzer
  35. Hacker Techniques Tools And Incident Handling
  36. Hacker Tools Mac
  37. Nsa Hack Tools Download
  38. Hacking Tools Hardware
  39. Pentest Tools Linux
  40. Pentest Recon Tools
  41. Hacking Tools For Windows 7
  42. Game Hacking
  43. Hack Tools Download
  44. Hacker Tools For Ios
  45. Hack Tools For Games
  46. Hack Rom Tools
  47. Hacking Tools Kit
  48. New Hacker Tools
  49. Hacking Tools Pc
  50. Pentest Reporting Tools
  51. Pentest Tools Free
  52. Easy Hack Tools
  53. Pentest Tools Subdomain
  54. Underground Hacker Sites
  55. Pentest Tools Github
  56. Hack Tools Github
  57. Pentest Tools Linux
  58. Pentest Tools Github
  59. Hacking Tools For Windows 7
  60. Hacking App
  61. Hacking Tools Hardware
  62. Pentest Tools Find Subdomains
  63. Hack Tools
  64. Hack And Tools
  65. Hacking Tools Windows
  66. Pentest Tools Find Subdomains
  67. Pentest Tools For Windows
  68. Hacker Tools 2019
  69. Hacker Tool Kit
  70. Hacking Tools Pc
  71. Bluetooth Hacking Tools Kali
  72. Hacking Tools 2019
  73. Pentest Tools Tcp Port Scanner
  74. Hacking Tools Software
  75. Hacking Tools Pc
  76. Hack Tools 2019
  77. Hacker Tools Free Download
  78. Hacker Search Tools
  79. Pentest Tools Android
  80. Hacker
  81. Hacker Tools Online
  82. Hacking Tools For Windows
  83. Top Pentest Tools
  84. How To Make Hacking Tools
  85. Hack Tools Github
  86. Hacker Tools
  87. Hacker Tools Github
  88. Hacking Tools Github
  89. Hacks And Tools
  90. Pentest Box Tools Download
  91. Hacking Tools Online
  92. Github Hacking Tools
  93. Pentest Reporting Tools
  94. Pentest Tools Nmap
  95. Hacker Tools For Windows
  96. Hacking Tools Hardware
  97. Pentest Tools Online
  98. Hacker Tools 2019
  99. Physical Pentest Tools
  100. Pentest Tools Tcp Port Scanner
  101. Pentest Tools Framework
  102. Hacking Tools Usb
  103. Hacking Apps
  104. Hack Tools Pc
  105. How To Hack
  106. Hacker Security Tools
  107. Beginner Hacker Tools
  108. Hacking Tools Pc
  109. Top Pentest Tools
  110. Hackrf Tools
  111. Pentest Tools Open Source
  112. Pentest Tools Url Fuzzer
  113. Free Pentest Tools For Windows
  114. Hack Website Online Tool
  115. Hacking Tools For Mac

No comments: