BEHC Hacking Class 2nd book Online : Footprinting or Information Gathering : BEHC (Born Ethical Hackers Club) has came up with second issue of its Ethical Hacking Class and Network security campaign. In our last issue we have learnt about basics of terms related to Ethical Hacking or simply Hacking and about how a hacker prepares or launches a hacking attempt or simply say hack attack. We have also discussed brief about different phases that involves in launching a hacking attempt like information gathering, scanning, gaining access, maintaining access and covering tracks respectively. This is what we have discussed in our last issue.
The topic of this issue is Footprinting or Information Gathering. This issue will teach you guys how to gather information about any victim or website. The information gathered can be used for launching Social Engineering attack, DDOS attack, Domain Hijacking attack, Domain Poisoning attack or even we can use this information to prepare word file which can be used for brute force attack.
In this issue we will learn about Information Gathering or Footprinting techniques. Because of lot of techniques involved in Foot Printing we have decided to publish the issue into two parts.
Below is the list of Footprinting techniques we are going to learn in first part.1
1. Finding IP address
3. Tracing routes
4. Who is data
5. DNS queries and DNS health check
1. Search Engine discovery or Reconnaissance
2. Spiders, Crawlers or Robots discovery
3. Web data Extraction
5. Web application fingerprint
6. Web server fingerprint
7. People Search