BEHC (Born Ethical Hackers Club) has came up with second issue of its Ethical Hacking Class and Network security campaign. In our last issue we have learnt about basics of terms related to Ethical Hacking or simply Hacking and about how a hacker prepares or launches a hacking attempt or simply say hack attack. We have also discussed brief about different phases that involves in launching a hacking attempt like information gathering, scanning, gaining access, maintaining access and covering tracks respectively. This is what we have discussed in our last issue.The topic of this issue is Footprinting or Information Gathering. This issue will teach you guys how to gather information about any victim or website. The information gathered can be used for launching Social Engineering attack, DDOS attack, Domain Hijacking attack, Domain Poisoning attack or even we can use this information to prepare word file which can be used for brute force attack.
BEHC Hacking Class 2nd Issue : Footprinting Part 1 online
In this issue we will learn about Information Gathering or Footprinting techniques. Because of lot of techniques involved in Foot Printing we have decided to publish the issue into two parts.
Below is the list of Footprinting techniques we are going to learn in first part.
1. Finding IP address
2. Ping Sweeps 3. Tracing routes 4. Who is data 5. DNS queries and DNS health check
What we will learn in Footprinting Part 2 Issue:
This issue contains detailed tutorials of all the above mentioned techniques i.e. how to find IP address (own or victim’s or websites), ping sweep technique, Flood ping DDOS attack, Trace route and its benefits, WHO is Information gathering and DNS health check and DNS basics. So download the latest issue now.
Hey Friends, This is Lokesh Singh. Your friend, who loves to share knowledge with friends as i believe in "Sharing is Caring". If you like our tutorials then you can send your gratitude by saying thanks or clicking any of our Sponsor ads.