Home / BEH / BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering

BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering

BEHC (Born Ethical Hackers Club) has came up with second issue of its Ethical and Network security campaign. In our last issue we have learnt about basics of terms related to Ethical or simply Hacking and about how a hacker prepares or launches a hacking attempt or simply say hack attack. We have also discussed brief about different phases that involves in launching a hacking attempt like , scanning, gaining access, maintaining access and covering tracks respectively. This is what we have discussed in our last issue.The topic of this issue is Footprinting or Information Gathering. This issue will teach you guys how to gather information about any victim or website. The information gathered can be used for launching attack, DDOS attack, Domain Hijacking attack, Domain Poisoning attack or even we can use this information to prepare word file which can be used for .

BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering
BEHC Hacking Class 2nd Issue : Footprinting Part 1 online

In this issue we will learn about Information Gathering or Footprinting techniques. Because of lot of techniques involved in Foot Printing we have decided to publish the issue into two parts.
Below is the list of Footprinting techniques we are going to learn in first part.

1. Finding IP address 

    2. Ping Sweeps
3. Tracing routes
4. Who is data
5. DNS queries  and DNS health check
What we will learn in Footprinting Part 2 Issue:

1. Search Engine discovery or Reconnaissance
2. Spiders, Crawlers or Robots discovery
3. Web data Extraction
4. Reviewing Meta data and Javascript’s
5. Web application fingerprint
6. Web server fingerprint
7. People Search

This issue contains detailed tutorials of all the above mentioned techniques i.e. how to find IP address (own or victim’s or websites), ping sweep technique, Flood ping DDOS attack, Trace route and its benefits, WHO is Information gathering and DNS health check and DNS basics. So download the latest issue now.
Alternative Download Link:
If you guys find any issues or mistakes in the book, please let me know, so that i can avoid them in later issues.
Lokesh Singh

About Lokesh Singh

Hello Friends, i am Lokesh Singh, certified Ethical hacker ( CEH, SSA, CSIF , CISSP). Have 8+ years of extensive experience in Ethical Hacking, Cyber Security and Penetration Testing domain.

Check Also


BAD USB Attack : Hacking by Just USB

BAD USB Attack : Turn the USB into Hack Tool BAD USB Attack executes the …

Leave a Comment