Home / Hacking School / Hacking Class 2 – Footprinting and How It can be HelpFul to Hack systems

Hacking Class 2 – Footprinting and How It can be HelpFul to Hack systems

Previously We have Introduces and hackers. Now In this class we will see what hackers do in pre-phases of hacking .i.e .

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems


Basically footprint is the blueprints of site/organisation/system that a hacker want to Hack i.e basic internal structure.Footprinting is the blueprint of the security profile of an organization, undertaken in a methodological

Footprinting is one of the three pre-attack phases. The others are scanning and enumeration.

Important Thing to be Noted : An attacker will spend 90% of the time in profiling an organization and another 10%  in launching the attack.

Now What is the result of Footprinting??? Can anyone guess It…. I explain it..

Footprinting results in a unique organization profile with respect to networks (Internet/intranet/extranet /wireless) and systems involved.Don’t It look amazing…

The most interesting stage of a targeted attack is the reconnaissance, or footprint analysis. Here you use the web, search engines, whois.com, to discover as much about the target as possible. A whois.com can tell you email address formats for instance (first letter last name @ company.com).
A Google search could reveal submission to forums by personnel that reveal brands of firewall or antivirus in use at the target. 
Sometimes network diagrams are even found that can guide an attack. The next stage, , meant using special tools, ( I date myself by mentioning Cybercop and Internet Security Scanner, these were the days before the open source Nessus) to discover open ports, services, and machines on the target network. And then, finally, you could start attacking various vulnerabilities that you had discovered.

1. www.whois.domaintools.com
Now How It can Help You To GET Info . I will Show It Through Snapshots…

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems
Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems
Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems

2. Now you can use this information to search more about Person using Simply google as shown in next snapshot..

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems

Hacking Class 2 - Footprinting and How It can be HelpFul to Hack systems


Now Its on you need How much info u want to explore about the person and website which u want to hack…

I think you all Will Like Thisss…. WE will continue Our Discussion on FOOTPRINTING tomorrow also… As It is the Most Important Phase….. 
We will Explore More Information in the Next class…. I will explain Few More interesting facts and information exploring things so read on…

I think this Deserves For Comments…Comments Please!

About Lokesh Singh

Hello Friends, i am Lokesh Singh, certified Ethical hacker ( CEH, SSA, CSIF , CISSP). Have 8+ years of extensive experience in Ethical Hacking, Cyber Security and Penetration Testing domain.

Check Also


Web Application Penetration Testing Fingerprinting Web Severs Tutorial

When conducting a Web Application Penetration Testing , the first thing to do always is …


  1. awesome….lol u hav explained all hacking about your site..Don’t you fear that u will be the first that is being hacked…

  2. really informative and coolll… Now I know i can really become hacker..Thanks ! lol :P He is professional hacker .He must be knowing how to protect his site from this Hacks…

  3. Great information brother..Really awesome .. He is professional hacker guys .you can’t hack him.. :D :X

  4. gr8 info… nice articles..:))

  5. All I want to say is thanks………. Plz reply my last question.. its urgent…

  6. I have replied ur previous question brother check It..

  7. Thanks for you response Guys.. If you have any query you can ask. I tutorial about footprinting is incomplete now. I will show you how to build blueprints and more ways to hack information about personnels..Keep Reading..

  8. thanks Sir…gr8 information..waiting for next one.

  9. Thanx for the info.. but how can i copy it to my lappy…

  10. too good…heads off…great work..

  11. thanks Sir.

  12. Rofl…. the snapshots are not clear… can’t understand…well

  13. Great job brother.Awaiting for next class

  14. right click on snapshots and view them in new tab…to view real size snapshots… U r really nooob..

  15. ha ha ha….ya ya but what about the cd i want it man…

  16. thanks alot :)

  17. wow, great info…thanks

  18. how to get the ip address of the people dude ur class is great


  20. thankss…brother.. but i have a question ? …..brother………………

    if the registrant is privacy protected then.. what is the next option to find out the details

  21. Ya Brother,you are right.Its such an useful article for general people to make their education enhance in hacking that it deserves comments.Speaking from my heart its awesome!I love your site and will love to visit your site again and again.Once again many many thanks brother for such a nice article.Keep coming with more such articles to make us crazy for your site.We all love you Lokesh.

  22. Why aren’t the Registrars privacy protected previously i.e. while registering? Why do we ‘ve to pay ’em to not publish our private or personal info. Are the registrants blackmailing us?

    E.g. If you don’t pay, they I will publish your private stuffs in the internet.

    Do answer me…I really want to be anonymous

  23. oh man fuking wao thnxxxxxxxxxxxxx dude

  24. ROFL!! your hilarious sir! hahaha! using yourself as an example just blow my mind. hahaha! Keep it up! your the best teacher! =))

Leave a Comment