SlideShare uma empresa Scribd logo
1 de 29
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learner as Security analyst.
Information Gathering
0 “If you know the enemy and know yourself you need

not fear the results of a hundred battles”
Session Flow
0 Information Gathering- Definition
0 Initial Info gathering of websites.
0 IP range Lookup
0 DNS information gathering.
0 Web Hosting info gathering.
0 Understanding hosting control Panels.
0 Subdomains.
0 Whois information.
Session Flow
0 Info Gathering using blogs & forums.
0 Info Gathering using search Engine
0 Info Gathering using Meta tags & Words.
0 People Search.
0 Info gathering using job portal websites.
What is Information
Gathering?
0 Information gathering is the process of collecting the

information from different places about any individual
company, organization, server, IP address or person.

0 Information gathering is the first step of hacking and most

of the time of hacker spend his time in this process. 90% of
time of a hacker spend in information gathering.

0 Information gathering plays a very vital role for both

investigating and attacking purposes.
Attacker’s Point of View
0 Attacker will first gather information like domain name, IP

address, IP range, operating system, services, control
panel, vulnerable services etc and later on exploit it.

0 Attackers use tools and social engineering to gather

information.

0 For attacking an individual person he will find his name,

address, date of birth, phone no and his personal
information and then use that information for attacking
that person.
Investigator’s Point of View
0 As an investigator information gathering is powerful

tool used in investigation.

0 Investigator will gather information like traces of

criminal, name, address, contact no, company
information etc before taking any legal action.

0 Investigators use tools and social networking sites to

gather information about criminal.
Whois
0 Whois is query to database to get following

information.

1. Owner of website.
2. Email id used to register domain.
3. Domain registrar.
4. Domain name server information.
5. Related websites
Whois

Whois.net has official database of all domains.
Whois
Reverse IP mapping
0 Reverse IP will give number of websites hosted on same

server.
0 If one website is vulnerable on the server then hacker

can easily root the server.
Trace Route
0 Trace route gives useful information regarding number of

servers between your computers & remote computers.
0 Useful for investigation as well as different attacks.
0 Visualroute, Neotrace.
Trace Route
Info. Gathering using Search
Engine
0 Search engines are efficient mediums to get specific

results according to your requirements.
0 Google, yahoo, bing etc..
0 search engine gives best results out of all.
Info Gathering Using Search
Engine
0 Maltego is an open source intelligence and forensics

application.

0 It allows for the mining and gathering of information as

well as the representation of this information in a
meaningful way.

0 Coupled with its graphing libraries, Maltego, allows you to

identify key relationships between information and
identify previously unknown relationships between them.
Maltego
Information gathering using
forum/blogs
• Almost 80% internet users use blogs/forums for

knowledge sharing purpose.
• Information gathering from specific blog will also helpful

in investigations.
Information gathering using
Jobs site
Information Gathering Using Financial
Services
Google Finance

Yahoo Finance
Info Gathering using Google
Maps
Information gathering using SN
Website
People Search
Information gathering using ESpiders
0 Email Spiders are automated soft wares which

captures email ids using spiders & store them on the
database. Spammers are using email spiders to collect
thousand emails for spamming purposes.
Monitoring Targets Using
Google Alerts
0 Google Alerts is a content monitoring service that

automatically notifies users when new content from
news, web, blogs, video and/or discussion groups
matches a set of search terms selected by the & stored
by the Google Alerts Service.

0 Google Alerts help in monitoring a developing news

story & keeping current on a competitor or industry.
Google Alerts
Information gathering using
Web Archive
0 Archive.org maintains logs of pages of website.
!! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar

Mais conteúdo relacionado

Mais procurados (20)

Network attacks
Network attacksNetwork attacks
Network attacks
 
Alcohols (B.Pharm 1st Year 2nd Sem.)
Alcohols (B.Pharm 1st Year 2nd Sem.)Alcohols (B.Pharm 1st Year 2nd Sem.)
Alcohols (B.Pharm 1st Year 2nd Sem.)
 
Network security
Network securityNetwork security
Network security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
System hacking
System hackingSystem hacking
System hacking
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The internet
The internetThe internet
The internet
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Data security
Data securityData security
Data security
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Data theft
Data theftData theft
Data theft
 
Incident response process
Incident response processIncident response process
Incident response process
 
Web browser
Web browserWeb browser
Web browser
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 

Semelhante a Information gathering

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
Footprinting
FootprintingFootprinting
FootprintingDuah John
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With GoogleZero Science Lab
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Monique Jones
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hackingUday Verma
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

Semelhante a Information gathering (20)

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Footprinting
FootprintingFootprinting
Footprinting
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Information gatherimg
Information gatherimgInformation gatherimg
Information gatherimg
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Último

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Information gathering

  • 1.
  • 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learner as Security analyst.
  • 3. Information Gathering 0 “If you know the enemy and know yourself you need not fear the results of a hundred battles”
  • 4. Session Flow 0 Information Gathering- Definition 0 Initial Info gathering of websites. 0 IP range Lookup 0 DNS information gathering. 0 Web Hosting info gathering. 0 Understanding hosting control Panels. 0 Subdomains. 0 Whois information.
  • 5. Session Flow 0 Info Gathering using blogs & forums. 0 Info Gathering using search Engine 0 Info Gathering using Meta tags & Words. 0 People Search. 0 Info gathering using job portal websites.
  • 6. What is Information Gathering? 0 Information gathering is the process of collecting the information from different places about any individual company, organization, server, IP address or person. 0 Information gathering is the first step of hacking and most of the time of hacker spend his time in this process. 90% of time of a hacker spend in information gathering. 0 Information gathering plays a very vital role for both investigating and attacking purposes.
  • 7. Attacker’s Point of View 0 Attacker will first gather information like domain name, IP address, IP range, operating system, services, control panel, vulnerable services etc and later on exploit it. 0 Attackers use tools and social engineering to gather information. 0 For attacking an individual person he will find his name, address, date of birth, phone no and his personal information and then use that information for attacking that person.
  • 8. Investigator’s Point of View 0 As an investigator information gathering is powerful tool used in investigation. 0 Investigator will gather information like traces of criminal, name, address, contact no, company information etc before taking any legal action. 0 Investigators use tools and social networking sites to gather information about criminal.
  • 9. Whois 0 Whois is query to database to get following information. 1. Owner of website. 2. Email id used to register domain. 3. Domain registrar. 4. Domain name server information. 5. Related websites
  • 10. Whois Whois.net has official database of all domains.
  • 11. Whois
  • 12. Reverse IP mapping 0 Reverse IP will give number of websites hosted on same server. 0 If one website is vulnerable on the server then hacker can easily root the server.
  • 13. Trace Route 0 Trace route gives useful information regarding number of servers between your computers & remote computers. 0 Useful for investigation as well as different attacks. 0 Visualroute, Neotrace.
  • 15. Info. Gathering using Search Engine 0 Search engines are efficient mediums to get specific results according to your requirements. 0 Google, yahoo, bing etc.. 0 search engine gives best results out of all.
  • 16. Info Gathering Using Search Engine 0 Maltego is an open source intelligence and forensics application. 0 It allows for the mining and gathering of information as well as the representation of this information in a meaningful way. 0 Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them.
  • 18. Information gathering using forum/blogs • Almost 80% internet users use blogs/forums for knowledge sharing purpose. • Information gathering from specific blog will also helpful in investigations.
  • 20. Information Gathering Using Financial Services Google Finance Yahoo Finance
  • 21. Info Gathering using Google Maps
  • 24. Information gathering using ESpiders 0 Email Spiders are automated soft wares which captures email ids using spiders & store them on the database. Spammers are using email spiders to collect thousand emails for spamming purposes.
  • 25.
  • 26. Monitoring Targets Using Google Alerts 0 Google Alerts is a content monitoring service that automatically notifies users when new content from news, web, blogs, video and/or discussion groups matches a set of search terms selected by the & stored by the Google Alerts Service. 0 Google Alerts help in monitoring a developing news story & keeping current on a competitor or industry.
  • 28. Information gathering using Web Archive 0 Archive.org maintains logs of pages of website.
  • 29. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar