Hacking Class 2 – Footprinting and How It can be HelpFul to Hack systems

Previously We have Introduces hacking and hackers. Now In this class we will see what hackers do in pre-phases of hacking .i.e Footprinting.

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems


Basically footprint is the blueprints of site/organisation/system that a hacker want to Hack i.e basic internal structure.Footprinting is the blueprint of the security profile of an organization, undertaken in a methodological

Footprinting is one of the three pre-attack phases. The others are scanning and enumeration.

Important Thing to be Noted : An attacker will spend 90% of the time in profiling an organization and another 10%  in launching the attack.

Now What is the result of Footprinting??? Can anyone guess It…. I explain it..

Footprinting results in a unique organization profile with respect to networks (Internet/intranet/extranet /wireless) and systems involved.Don’t It look amazing…

The most interesting stage of a targeted attack is the reconnaissance, or footprint analysis. Here you use the web, search engines, whois.com, to discover as much about the target as possible. A whois.com can tell you email address formats for instance (first letter last name @ company.com).
A Google search could reveal submission to forums by security personnel that reveal brands of firewall or antivirus in use at the target. 
Sometimes network diagrams are even found that can guide an attack. The next stage, scanning, meant using special tools, ( I date myself by mentioning Cybercop and Internet Security Scanner, these were the days before the open source Nessus) to discover open ports, services, and machines on the target network. And then, finally, you could start attacking various vulnerabilities that you had discovered.

1. www.whois.domaintools.com
Now How It can Help You To GET Info . I will Show It Through Snapshots…

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems
Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems
Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems

2. Now you can use this information to search more about Person using Simply google as shown in next snapshot..

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems


Now Its on you need How much info u want to explore about the person and website which u want to hack…

I think you all Will Like Thisss…. WE will continue Our Discussion on FOOTPRINTING tomorrow also… As It is the Most Important Phase….. 
We will Explore More Information in the Next class…. I will explain Few More interesting facts and information exploring things so read on…

I think this Deserves For Comments…Comments Please!

Author Bio

Lokesh Singh

Hello Friends, i am Lokesh Singh, certified Ethical hacker ( CEH, SSA, CSIF , CISSP). Have 8+ years of extensive experience in Ethical Hacking, Cyber Security and Penetration Testing domain.

  1. Adarsh

    October 18, 2009 at 3:01 am

    awesome….lol u hav explained all hacking about your site..Don’t you fear that u will be the first that is being hacked…

  2. Ashutosh

    October 18, 2009 at 3:02 am

    really informative and coolll… Now I know i can really become hacker..Thanks ! lol :P He is professional hacker .He must be knowing how to protect his site from this Hacks…

  3. Dogulas

    October 18, 2009 at 3:03 am

    Great information brother..Really awesome .. He is professional hacker guys .you can’t hack him.. :D :X

  4. Anonymous

    October 18, 2009 at 3:05 am

    gr8 info… nice articles..:))

  5. Meghraj

    October 18, 2009 at 3:07 am

    All I want to say is thanks………. Plz reply my last question.. its urgent…

  6. Lokesh Singh

    October 18, 2009 at 3:10 am

    I have replied ur previous question brother check It..

  7. Lokesh Singh

    October 18, 2009 at 3:12 am

    Thanks for you response Guys.. If you have any query you can ask. I tutorial about footprinting is incomplete now. I will show you how to build blueprints and more ways to hack information about personnels..Keep Reading..

  8. Anonymous

    October 18, 2009 at 4:38 am

    thanks Sir…gr8 information..waiting for next one.

  9. Meghraj

    October 18, 2009 at 4:44 am

    Thanx for the info.. but how can i copy it to my lappy…

  10. Anonymous

    October 18, 2009 at 6:54 am

    too good…heads off…great work..

  11. Anonymous

    October 18, 2009 at 7:26 am

    thanks Sir.

  12. Meghraj

    October 18, 2009 at 8:38 am

    Rofl…. the snapshots are not clear… can’t understand…well

  13. Navasai

    October 18, 2009 at 9:04 am

    Great job brother.Awaiting for next class


    October 18, 2009 at 9:55 am

    right click on snapshots and view them in new tab…to view real size snapshots… U r really nooob..

  15. Meghraj

    October 18, 2009 at 11:17 am

    ha ha ha….ya ya but what about the cd i want it man…

  16. Satz

    October 18, 2009 at 1:01 pm

    Great work!

  17. Anonymous

    October 18, 2009 at 1:07 pm

    thanks alot :)

  18. Anonymous

    October 24, 2009 at 12:37 am

    wow, great info…thanks

  19. karthik

    November 20, 2009 at 12:33 pm

    how to get the ip address of the people dude ur class is great

  20. Pulkit Bansal

    December 18, 2009 at 9:16 pm


  21. Bonny

    January 15, 2010 at 11:52 am

    thankss…brother.. but i have a question ? …..brother………………

    if the registrant is privacy protected then.. what is the next option to find out the details

  22. sandipdey3

    January 23, 2010 at 5:00 am

    Ya Brother,you are right.Its such an useful article for general people to make their education enhance in hacking that it deserves comments.Speaking from my heart its awesome!I love your site and will love to visit your site again and again.Once again many many thanks brother for such a nice article.Keep coming with more such articles to make us crazy for your site.We all love you Lokesh.

  23. Anonymous

    June 17, 2010 at 12:26 pm

    Why aren’t the Registrars privacy protected previously i.e. while registering? Why do we ‘ve to pay ’em to not publish our private or personal info. Are the registrants blackmailing us?

    E.g. If you don’t pay, they I will publish your private stuffs in the internet.

    Do answer me…I really want to be anonymous

  24. Anonymous

    September 24, 2010 at 8:45 am

    oh man fuking wao thnxxxxxxxxxxxxx dude

  25. Anonymous

    October 21, 2010 at 5:09 am

    ROFL!! your hilarious sir! hahaha! using yourself as an example just blow my mind. hahaha! Keep it up! your the best teacher! =))

  26. prakash

    November 29, 2010 at 1:24 pm

    than dude

Leave a Comment