Hello readers, well you are learning hacking so suppose you wish to hack something for example a website, server or anything else. What would be your first step? If you have read my post Basic Terminologies then you must be knowing that first of all you have to gather information about the target. So how does one do that, is what we are going to know about today. We call this act of gathering information about the target as Footprinting. It can be active as well as passive i.e., it could be done using the resources available online or it can be done even offline. Apart from the technical information gathered during this step such as e-mails, passwords, type of OS etc that can be used during the attack phase, a lot of non-technical information is also gathered which can be used for other purposes such as to social engineer someone.
There are many ways with the help of which you can gather information about the target. Some of them are explained below:-
1. Crawling : Visiting the target website(if any) for information like emails, phone no's etc is what we call crawling. The best way of crawling is by downloading the target's entire website using softwares such as Black Widow or IDM and then analysing it.
2. Whois : We can even query the whois database against the company's domain name(the website) to get the details about the technical staff who are managing the website, email addresses, other information about the domain name along with the details about the registration by doing the whois lookup at whois.com. We can even locate the name servers with the help of this utility.
3.Search Engines : If used properly a lot of information can also be unearthed using the search engines such as Google and Bing. For example, a hacker could search a website through Google by searching “site:www.the-target-site.com” this will display every page that Google has of the website. You could narrow down the number of results by adding a specific word after. For example the hacker could search “site:www.the-target-site.com email”. This search could list several emails that are published on the website. Another search you could do in Google is “inurl:robots.txt" this would look for a page called robots.txt. If a site has the file “robots.txt”, it displays all the directories and pages on the website that they wish to keep anonymous from the search engine spiders. Occasionally one might come across some valuable information that was meant to be kept private in this file.
4. Trace route : Another way of footprinting is to use the tracert command in command prompt(CMD) to see where our request is being forwaded and through which devices. In Linux systems traceroute and tracepath commands can be used.
5. Social Networking Websites : Websites such as Facebook, Twitter, LinkedIn and other social networking websites can also be used to gather information about the target which can be deployed in later stages. for example if you are targeting a company then you can compile a list of the employees working in the company by the above discussed methods and then look for their details on such social networking sites which can be helpful for social engineering attacks.
Well I think that's enough for today but don't forget to practice.
There are many ways with the help of which you can gather information about the target. Some of them are explained below:-
1. Crawling : Visiting the target website(if any) for information like emails, phone no's etc is what we call crawling. The best way of crawling is by downloading the target's entire website using softwares such as Black Widow or IDM and then analysing it.
2. Whois : We can even query the whois database against the company's domain name(the website) to get the details about the technical staff who are managing the website, email addresses, other information about the domain name along with the details about the registration by doing the whois lookup at whois.com. We can even locate the name servers with the help of this utility.
3.Search Engines : If used properly a lot of information can also be unearthed using the search engines such as Google and Bing. For example, a hacker could search a website through Google by searching “site:www.the-target-site.com” this will display every page that Google has of the website. You could narrow down the number of results by adding a specific word after. For example the hacker could search “site:www.the-target-site.com email”. This search could list several emails that are published on the website. Another search you could do in Google is “inurl:robots.txt" this would look for a page called robots.txt. If a site has the file “robots.txt”, it displays all the directories and pages on the website that they wish to keep anonymous from the search engine spiders. Occasionally one might come across some valuable information that was meant to be kept private in this file.
4. Trace route : Another way of footprinting is to use the tracert command in command prompt(CMD) to see where our request is being forwaded and through which devices. In Linux systems traceroute and tracepath commands can be used.
5. Social Networking Websites : Websites such as Facebook, Twitter, LinkedIn and other social networking websites can also be used to gather information about the target which can be deployed in later stages. for example if you are targeting a company then you can compile a list of the employees working in the company by the above discussed methods and then look for their details on such social networking sites which can be helpful for social engineering attacks.
Well I think that's enough for today but don't forget to practice.