SlideShare uma empresa Scribd logo
1 de 29
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learner as Security analyst.
Information Gathering
0 “If you know the enemy and know yourself you need

not fear the results of a hundred battles”
Session Flow
0 Information Gathering- Definition
0 Initial Info gathering of websites.
0 IP range Lookup
0 DNS information gathering.
0 Web Hosting info gathering.
0 Understanding hosting control Panels.
0 Subdomains.
0 Whois information.
Session Flow
0 Info Gathering using blogs & forums.
0 Info Gathering using search Engine
0 Info Gathering using Meta tags & Words.
0 People Search.
0 Info gathering using job portal websites.
What is Information
Gathering?
0 Information gathering is the process of collecting the

information from different places about any individual
company, organization, server, IP address or person.

0 Information gathering is the first step of hacking and most

of the time of hacker spend his time in this process. 90% of
time of a hacker spend in information gathering.

0 Information gathering plays a very vital role for both

investigating and attacking purposes.
Attacker’s Point of View
0 Attacker will first gather information like domain name, IP

address, IP range, operating system, services, control
panel, vulnerable services etc and later on exploit it.

0 Attackers use tools and social engineering to gather

information.

0 For attacking an individual person he will find his name,

address, date of birth, phone no and his personal
information and then use that information for attacking
that person.
Investigator’s Point of View
0 As an investigator information gathering is powerful

tool used in investigation.

0 Investigator will gather information like traces of

criminal, name, address, contact no, company
information etc before taking any legal action.

0 Investigators use tools and social networking sites to

gather information about criminal.
Whois
0 Whois is query to database to get following

information.

1. Owner of website.
2. Email id used to register domain.
3. Domain registrar.
4. Domain name server information.
5. Related websites
Whois

Whois.net has official database of all domains.
Whois
Reverse IP mapping
0 Reverse IP will give number of websites hosted on same

server.
0 If one website is vulnerable on the server then hacker

can easily root the server.
Trace Route
0 Trace route gives useful information regarding number of

servers between your computers & remote computers.
0 Useful for investigation as well as different attacks.
0 Visualroute, Neotrace.
Trace Route
Info. Gathering using Search
Engine
0 Search engines are efficient mediums to get specific

results according to your requirements.
0 Google, yahoo, bing etc..
0 search engine gives best results out of all.
Info Gathering Using Search
Engine
0 Maltego is an open source intelligence and forensics

application.

0 It allows for the mining and gathering of information as

well as the representation of this information in a
meaningful way.

0 Coupled with its graphing libraries, Maltego, allows you to

identify key relationships between information and
identify previously unknown relationships between them.
Maltego
Information gathering using
forum/blogs
• Almost 80% internet users use blogs/forums for

knowledge sharing purpose.
• Information gathering from specific blog will also helpful

in investigations.
Information gathering using
Jobs site
Information Gathering Using Financial
Services
Google Finance

Yahoo Finance
Info Gathering using Google
Maps
Information gathering using SN
Website
People Search
Information gathering using ESpiders
0 Email Spiders are automated soft wares which

captures email ids using spiders & store them on the
database. Spammers are using email spiders to collect
thousand emails for spamming purposes.
Monitoring Targets Using
Google Alerts
0 Google Alerts is a content monitoring service that

automatically notifies users when new content from
news, web, blogs, video and/or discussion groups
matches a set of search terms selected by the & stored
by the Google Alerts Service.

0 Google Alerts help in monitoring a developing news

story & keeping current on a competitor or industry.
Google Alerts
Information gathering using
Web Archive
0 Archive.org maintains logs of pages of website.
!! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar

Mais conteúdo relacionado

Mais procurados

Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 

Mais procurados (20)

Anti virus
Anti virusAnti virus
Anti virus
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Computer security
Computer securityComputer security
Computer security
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Information classification
Information classificationInformation classification
Information classification
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
IT security
IT securityIT security
IT security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Data security
Data securityData security
Data security
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Information security
Information securityInformation security
Information security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Database security
Database securityDatabase security
Database security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 

Semelhante a Information gathering

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
Footprinting
FootprintingFootprinting
FootprintingDuah John
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With GoogleZero Science Lab
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Monique Jones
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hackingUday Verma
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

Semelhante a Information gathering (20)

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Footprinting
FootprintingFootprinting
Footprinting
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Information gatherimg
Information gatherimgInformation gatherimg
Information gatherimg
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Information gathering

  • 1.
  • 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learner as Security analyst.
  • 3. Information Gathering 0 “If you know the enemy and know yourself you need not fear the results of a hundred battles”
  • 4. Session Flow 0 Information Gathering- Definition 0 Initial Info gathering of websites. 0 IP range Lookup 0 DNS information gathering. 0 Web Hosting info gathering. 0 Understanding hosting control Panels. 0 Subdomains. 0 Whois information.
  • 5. Session Flow 0 Info Gathering using blogs & forums. 0 Info Gathering using search Engine 0 Info Gathering using Meta tags & Words. 0 People Search. 0 Info gathering using job portal websites.
  • 6. What is Information Gathering? 0 Information gathering is the process of collecting the information from different places about any individual company, organization, server, IP address or person. 0 Information gathering is the first step of hacking and most of the time of hacker spend his time in this process. 90% of time of a hacker spend in information gathering. 0 Information gathering plays a very vital role for both investigating and attacking purposes.
  • 7. Attacker’s Point of View 0 Attacker will first gather information like domain name, IP address, IP range, operating system, services, control panel, vulnerable services etc and later on exploit it. 0 Attackers use tools and social engineering to gather information. 0 For attacking an individual person he will find his name, address, date of birth, phone no and his personal information and then use that information for attacking that person.
  • 8. Investigator’s Point of View 0 As an investigator information gathering is powerful tool used in investigation. 0 Investigator will gather information like traces of criminal, name, address, contact no, company information etc before taking any legal action. 0 Investigators use tools and social networking sites to gather information about criminal.
  • 9. Whois 0 Whois is query to database to get following information. 1. Owner of website. 2. Email id used to register domain. 3. Domain registrar. 4. Domain name server information. 5. Related websites
  • 10. Whois Whois.net has official database of all domains.
  • 11. Whois
  • 12. Reverse IP mapping 0 Reverse IP will give number of websites hosted on same server. 0 If one website is vulnerable on the server then hacker can easily root the server.
  • 13. Trace Route 0 Trace route gives useful information regarding number of servers between your computers & remote computers. 0 Useful for investigation as well as different attacks. 0 Visualroute, Neotrace.
  • 15. Info. Gathering using Search Engine 0 Search engines are efficient mediums to get specific results according to your requirements. 0 Google, yahoo, bing etc.. 0 search engine gives best results out of all.
  • 16. Info Gathering Using Search Engine 0 Maltego is an open source intelligence and forensics application. 0 It allows for the mining and gathering of information as well as the representation of this information in a meaningful way. 0 Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them.
  • 18. Information gathering using forum/blogs • Almost 80% internet users use blogs/forums for knowledge sharing purpose. • Information gathering from specific blog will also helpful in investigations.
  • 20. Information Gathering Using Financial Services Google Finance Yahoo Finance
  • 21. Info Gathering using Google Maps
  • 24. Information gathering using ESpiders 0 Email Spiders are automated soft wares which captures email ids using spiders & store them on the database. Spammers are using email spiders to collect thousand emails for spamming purposes.
  • 25.
  • 26. Monitoring Targets Using Google Alerts 0 Google Alerts is a content monitoring service that automatically notifies users when new content from news, web, blogs, video and/or discussion groups matches a set of search terms selected by the & stored by the Google Alerts Service. 0 Google Alerts help in monitoring a developing news story & keeping current on a competitor or industry.
  • 28. Information gathering using Web Archive 0 Archive.org maintains logs of pages of website.
  • 29. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar