Home / Ethical Hacking / BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering

BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering

BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering : BEHC (Born Ethical Hackers Club) has came up with second issue of its Ethical Hacking Class and Network security campaign. In our last issue we have learnt about basics of terms related to Ethical Hacking or simply Hacking and about how a hacker prepares or launches a hacking attempt or simply say hack attack. We have also discussed brief about different phases that involves in launching a hacking attempt like information gathering, scanning, gaining access, maintaining access and covering tracks respectively. This is what we have discussed in our last issue.

The topic of this issue is Footprinting or Information Gathering. This issue will teach you guys how to gather information about any victim or website. The information gathered can be used for launching Social Engineering attack, DDOS attack, Domain Hijacking attack, Domain Poisoning attack or even we can use this information to prepare word file which can be used for brute force attack.

Online Hacking class
Online Hacking class

In this issue we will learn about Information Gathering or Footprinting techniques. Because of lot of techniques involved in Foot Printing we have decided to publish the issue into two parts.

Below is the list of Footprinting techniques we are going to learn in first part.1

1. Finding IP address

2. Ping Sweeps
3. Tracing routes
4. Who is data
5. DNS queries  and DNS health check
What we will learn in Footprinting Part 2 Issue:

1. Search Engine discovery or Reconnaissance
2. Spiders, Crawlers or Robots discovery
3. Web data Extraction
4. Reviewing Meta data and Javascript’s
5. Web application fingerprint
6. Web server fingerprint
7. People Search
This issue contains detailed tutorials of all the above mentioned techniques i.e. how to find IP address (own or victim’s or websites), ping sweep technique, Flood ping DDOS attack, Trace route and its benefits, WHO is Information gathering and DNS health check and DNS basics. So download the latest issue now.
If you guys find any issues or mistakes in the book, please let me know, so that i can avoid them in later issues.
Regards,Lokesh Singh

About Lokesh Singh

Hello Friends, i am Lokesh Singh, certified Ethical hacker ( CEH, SSA, CSIF , CISSP). Have 8+ years of extensive experience in Ethical Hacking, Cyber Security and Penetration Testing domain.

Have any Suggestions? Compliments? Why not comment then?