2. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Information Gathering
Information Gathering using Search engine:
One leaves footprints/information everywhere while surfing internet”.
this is basic principle for investigators as well as hackers. the only
difference is the way they use this information
Attacker will gather information about the system, operating system,
about vulnerable application running on them & later on exploit it.
Investigator will gather information on how he got an access to
system & where he left his/her footprint behind on the same system & later
on traced it.
Search engine are most powerful tool to search about any individual,
organization & system
3. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Following are the list of top 10 search engines:
Google Search -World‟s most powerful search engine:
www.google.com
Yahoo Search: www.search.yahoo.com
MSN Live Search: www.live.com
AOL Search: www.search.aol.in
Ask Search: www.ask.com
Information Gathering
4. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Altavista Search: www.altavista.com
Fast Search : www.alltheweb.com
Gigablast : www.gigablast.com
Snap Search: www.snap.com
Information Gathering
5. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Information gathering using relational search engine.
These type of search engines gets results from different search engine &
make relation or connections between those results.
Kartoo
Information Gathering
6. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Maltego
Maltego is an open source intelligence and forensics application.
It allows for the mining and gathering of information as well as the
representation of this information in a meaningful way.
Coupled with its graphing libraries, Maltego, allows you to identify key
relationships between information and identify previously unknown
relationships between them.
It is a must-have tool in the forensics. security and intelligence fields!
Maltego offers the user with unprecedented information. Information is
leverage.
Information Gathering
9. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
People search will give information about phone number, address as well as
background info about the organizations.
People Search - Investigator can find personal information using people search.
Information Gathering
11. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
WHOIS (pronounced "who is"; not an acronym) is a query/response protocol
which is widely used for querying an official database in order to determine
the owner of domain name, an IP address, or an autonomous system number
on the Internet
WHOIS lookups were traditionally made using a command line interface,
but a number of simplified web-based tools now exist for looking up
domain ownership details from different databases
Web-based WHOIS clients still rely on the WHOIS protocol to connect to a
WHOIS server and do lookups, and command-line WHOIS clients are still
quite widely used by system administrators.
WHOIS normally runs on TCP port 43.
Presently ICANN is undertaking a study to determine the uses and abuses of
WHOIS information.
Information Gathering
16. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Reverse IP Mapping:
Reverse IP mapping is the method to find number of websites hosted on
same server
Trace Route:
Traceroute gives useful information regarding number of servers between
your. computers & remote computers
Useful for investigation as well as different attacks.
Visualroute, Neotrace.
NeoTrace gives MAP view, Node View as well as List View of number of
nodes between your computer & remote computer.
Information Gathering