SlideShare a Scribd company logo
1 of 17
Download to read offline
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
ETHICAL
HACKING
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Information Gathering
 Information Gathering using Search engine:
One leaves footprints/information everywhere while surfing internet”.
this is basic principle for investigators as well as hackers. the only
difference is the way they use this information
Attacker will gather information about the system, operating system,
about vulnerable application running on them & later on exploit it.
Investigator will gather information on how he got an access to
system & where he left his/her footprint behind on the same system & later
on traced it.
Search engine are most powerful tool to search about any individual,
organization & system
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Following are the list of top 10 search engines:
Google Search -World‟s most powerful search engine:
 www.google.com
Yahoo Search: www.search.yahoo.com
MSN Live Search: www.live.com
AOL Search: www.search.aol.in
Ask Search: www.ask.com
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Altavista Search: www.altavista.com
Fast Search : www.alltheweb.com
Gigablast : www.gigablast.com
Snap Search: www.snap.com
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
 Information gathering using relational search engine.
These type of search engines gets results from different search engine &
make relation or connections between those results.
Kartoo
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Maltego
Maltego is an open source intelligence and forensics application.
It allows for the mining and gathering of information as well as the
representation of this information in a meaningful way.
Coupled with its graphing libraries, Maltego, allows you to identify key
relationships between information and identify previously unknown
relationships between them.
It is a must-have tool in the forensics. security and intelligence fields!
Maltego offers the user with unprecedented information. Information is
leverage.
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
People search will give information about phone number, address as well as
background info about the organizations.
People Search - Investigator can find personal information using people search.
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Intellius:
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
WHOIS (pronounced "who is"; not an acronym) is a query/response protocol
which is widely used for querying an official database in order to determine
the owner of domain name, an IP address, or an autonomous system number
on the Internet
WHOIS lookups were traditionally made using a command line interface,
but a number of simplified web-based tools now exist for looking up
domain ownership details from different databases
Web-based WHOIS clients still rely on the WHOIS protocol to connect to a
WHOIS server and do lookups, and command-line WHOIS clients are still
quite widely used by system administrators.
WHOIS normally runs on TCP port 43.
Presently ICANN is undertaking a study to determine the uses and abuses of
WHOIS information.
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Domain Tools:
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Whois.net
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Samspade.org
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
In registry
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Reverse IP Mapping:
Reverse IP mapping is the method to find number of websites hosted on
same server
Trace Route:
Traceroute gives useful information regarding number of servers between
your. computers & remote computers
Useful for investigation as well as different attacks.
Visualroute, Neotrace.
NeoTrace gives MAP view, Node View as well as List View of number of
nodes between your computer & remote computer.
Information Gathering
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
Email Spiders
Information Gathering

More Related Content

What's hot

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage DetectionIRJET Journal
 
Battlefield network
Battlefield networkBattlefield network
Battlefield networkTal Be'ery
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Vipforensics2020 deck easygather_covid19
Vipforensics2020 deck easygather_covid19Vipforensics2020 deck easygather_covid19
Vipforensics2020 deck easygather_covid19Vincent I. Perez
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptOnkar1431
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal healthIMPULSE_TECHNOLOGY
 
A security strategy against steal and pass
A security strategy against steal and passA security strategy against steal and pass
A security strategy against steal and passIJNSA Journal
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...IJERA Editor
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectiongaurav kumar
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Matthew Kurnava
 

What's hot (19)

AML Knowledge Graph
AML Knowledge GraphAML Knowledge Graph
AML Knowledge Graph
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
 
Battlefield network
Battlefield networkBattlefield network
Battlefield network
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Vipforensics2020 deck easygather_covid19
Vipforensics2020 deck easygather_covid19Vipforensics2020 deck easygather_covid19
Vipforensics2020 deck easygather_covid19
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
A security strategy against steal and pass
A security strategy against steal and passA security strategy against steal and pass
A security strategy against steal and pass
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16
 
P2 Project
P2 ProjectP2 Project
P2 Project
 

Similar to Information gatherimg

Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Boston Institute of Analytics
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speedSreejith.D. Menon
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolIJMER
 
Footprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhFootprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhMujmmil Shaikh
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guideMatt Ford
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hackingUday Verma
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecCMR WORLD TECH
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
 
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...Boston Institute of Analytics
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxInfosectrain3
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat ForensicsIJSRD
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathringGouasmia Zakaria
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 

Similar to Information gatherimg (20)

Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Footprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhFootprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil Shaikh
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Forensic tools
Forensic toolsForensic tools
Forensic tools
 
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Information gatherimg

  • 1. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE ETHICAL HACKING
  • 2. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Information Gathering  Information Gathering using Search engine: One leaves footprints/information everywhere while surfing internet”. this is basic principle for investigators as well as hackers. the only difference is the way they use this information Attacker will gather information about the system, operating system, about vulnerable application running on them & later on exploit it. Investigator will gather information on how he got an access to system & where he left his/her footprint behind on the same system & later on traced it. Search engine are most powerful tool to search about any individual, organization & system
  • 3. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Following are the list of top 10 search engines: Google Search -World‟s most powerful search engine:  www.google.com Yahoo Search: www.search.yahoo.com MSN Live Search: www.live.com AOL Search: www.search.aol.in Ask Search: www.ask.com Information Gathering
  • 4. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Altavista Search: www.altavista.com Fast Search : www.alltheweb.com Gigablast : www.gigablast.com Snap Search: www.snap.com Information Gathering
  • 5. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE  Information gathering using relational search engine. These type of search engines gets results from different search engine & make relation or connections between those results. Kartoo Information Gathering
  • 6. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Maltego Maltego is an open source intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way. Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them. It is a must-have tool in the forensics. security and intelligence fields! Maltego offers the user with unprecedented information. Information is leverage. Information Gathering
  • 7. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Information Gathering
  • 8. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Information Gathering
  • 9. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE People search will give information about phone number, address as well as background info about the organizations. People Search - Investigator can find personal information using people search. Information Gathering
  • 10. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Intellius: Information Gathering
  • 11. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE WHOIS (pronounced "who is"; not an acronym) is a query/response protocol which is widely used for querying an official database in order to determine the owner of domain name, an IP address, or an autonomous system number on the Internet WHOIS lookups were traditionally made using a command line interface, but a number of simplified web-based tools now exist for looking up domain ownership details from different databases Web-based WHOIS clients still rely on the WHOIS protocol to connect to a WHOIS server and do lookups, and command-line WHOIS clients are still quite widely used by system administrators. WHOIS normally runs on TCP port 43. Presently ICANN is undertaking a study to determine the uses and abuses of WHOIS information. Information Gathering
  • 12. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Domain Tools: Information Gathering
  • 13. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Whois.net Information Gathering
  • 14. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Samspade.org Information Gathering
  • 15. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE In registry Information Gathering
  • 16. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Reverse IP Mapping: Reverse IP mapping is the method to find number of websites hosted on same server Trace Route: Traceroute gives useful information regarding number of servers between your. computers & remote computers Useful for investigation as well as different attacks. Visualroute, Neotrace. NeoTrace gives MAP view, Node View as well as List View of number of nodes between your computer & remote computer. Information Gathering
  • 17. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE Email Spiders Information Gathering