alternative
  • Home (current)
  • About
  • Tutorial
    Technologies
    C#
    Deep Learning
    Statistics for AIML
    Natural Language Processing
    Machine Learning
    SQL -Structured Query Language
    Python
    Ethical Hacking
    Placement Preparation
    Quantitative Aptitude
    View All Tutorial
  • Quiz
    C#
    SQL -Structured Query Language
    Quantitative Aptitude
    Java
    View All Quiz Course
  • Q & A
    C#
    Quantitative Aptitude
    Java
    View All Q & A course
  • Programs
  • Articles
    Identity And Access Management
    Artificial Intelligence & Machine Learning Project
    How to publish your local website on github pages with a custom domain name?
    How to download and install Xampp on Window Operating System ?
    How To Download And Install MySql Workbench
    How to install Pycharm ?
    How to install Python ?
    How to download and install Visual Studio IDE taking an example of C# (C Sharp)
    View All Post
  • Tools
    Program Compiler
    Sql Compiler
    Replace Multiple Text
    Meta Data From Multiple Url
  • Contact
  • User
    Login
    Register

Ethical Hacking - Ethical Hacking Phases - Common Technique to Gather Information Tutorial

Some of common technique to gather information mostly used over  internet are-

  1. Whois and domain registry
  2. Finding Ip Address, domain name, track packet (using Ping, nslookup and tracert command)
  3. Finding Hosting Company
  4. People Search
  5. Company information via search engine
  6. Social network
  7. Tracking target location

 

  1. Whois and domain registry

When we buy a domain, we have to submit some detail which are going to store in domain registry. Domain registry  (like godaddy.com, namecheap.com) will supervise a domain.

Using Whois Search https://www.whois.com/   or  https://who.is/ 

During this phase a hacker can collect information like

  • Domain name
  • IP address
  • Namespace
  • Owner Name
  • Organisation
  • Address
  • City
  • State
  • Postal Code
  • Country
  • Phone
  • Email

 

   

  1. Finding Ip Address (using Ping command)

We can use ping command to find out IP address of any domain (e.g google.com) through command prompt.

Ping fresherbell.com

Tracing route of domain name

Using nslookup to find IP address

  1. Finding Hosting Company

Once you have IP address , you can identify geographical location and proxy  using below link

https://www.ip2location.com

  1. People Search

In this host of a web application provide information about individual at a certain cost.

Here, attacker should know some of the information about target machine such as phone number, email address, name, etc.

Some of this services are:

  • Pipl.com https://pipl.com
  • Spokeo.com  https://www.spokeo.com
  1. Company information via search engine

Company information can be get from company sites, newspaper, company promotions, social sites, etc.

 Using this an attacker can gather  as much as information to exploit the target machine.

  1. Social network

Social network hold very large data of any organisation and its employee.

Using Social Sites, proper test plan can be made of each individual. Which can later be used to execute.

  1. Tracking target location

It is used by law enforcement agency to track cyber criminal.

It can be tracing through email, or rifling through the header information help track the servers that an email passed through.

Ethical Hacking

Ethical Hacking

  • Introduction
  • Overview
    • Information Technology
    • Ethical Hacking
    • Types Of Hacker
    • Phase Of Hacking
  • Environmental Setup
    • Download Virtual Box
    • Install Kali Linux OS in Virtual Box
    • Resize Kali Linux To Full Screen
  • Ethical Hacking Phases
    • Common Technique to Gather Information
    • Reconnaisance / Footprinting
    • Fingerprinting
    • Sniffing
    • ARP Poisioning
    • SQL Injection
    • Cross Site Scripting
    • Social Engineering
    • Denial of service Attack
    • Session Hijacking

About Fresherbell

Best learning portal that provides you great learning experience of various technologies with modern compilation tools and technique

Important Links

Don't hesitate to give us a call or send us a contact form message

Terms & Conditions
Privacy Policy
Contact Us

Social Media

© Untitled. All rights reserved. Demo Images: Unsplash. Design: HTML5 UP.