SlideShare a Scribd company logo
1 of 10
Footprinting and Scanning-
Seven Step Information
Gathering Process
Overview of
the Seven Step
Information –
Gathering
Process
• Scope of footprinting comprises of collating information
which can be in the form of it being passive or active
• Deceptively phoning the helpdesk to elicit sensitive
information is categorised as active information
gathering.
• Reviewing company information from a website is
defined as passive footprinting.
• Scope of scanning entails pinging machines, identifying
network ranges, port scanning systems
• EC Council developed a framework for footprinting and
scanning into 7 steps
Footprinting
and Scanning
Framework
Information gathering
Determining the network range
Identifying active machines
Finding open ports and access points
OS fingerprinting
Fingerprinting services
Mapping the network attack surface
1. Information
Gathering
• Critical step within the process of footprinting and
scanning
• Information about companies can be elicited from
company website, trade papers, financial databases
or from ex employees etc
• Developing a documentation with matrix fields such
as domain name, IP address, DNS Servers, Employee
information, e-mail addresses, IP Addresses, open
ports etc can help you structure your analysis
• Collating information about a website can typically
comprise of the following: Company URL, Internal
URL, Restricted URL, Internal Pages,
Jobsites
• Job sites can be used to collate valuable company information,
most popular job boards are the following: Careerbuilder.com
Monster.com Dice.com Indeed.com etc
• Attackers can also use the following types of websites to collate
information about people and employees:
1. Pipl: https://pipl.com/ Spokeo:
2. http://www.spokeo.com/ BirthdayDatabase.com:
3. http://www.birthdatabase.com/
4. Whitepages: http://www.whitepages.com
5. People Search Now: http://www.peoplesearchnow.com/
6. Zabasearch: http://www.zabasearch.com/
7. Peoplefinders: http://www.peoplefinders.com/
8. Justia email finder:
http://virtualchase.justia.com/content/finding-email-
addresses
Social Networking
• Social networking sites can also be utilised to collate people
information: Facebook Twitter LinkedIn Google+ Pinterest etc
• Financial Information about a company can be collated using
the following websites:
1. Marketwatch: http://www.marketwatch.com
2. Experian: http://www.experian.com
3. Wall Street Consensus Monitor:
http://www.wallstreetconsensusmonitor.com/
4. Euromonitor: http://www.euromonitor.com
Basic Google Hacking
• Google as a search engine can be pursued to perform
detailed searches on people
• Google search engine has the powerful capabilities to
translate documents, perform new searches and do
image searches.
• Hackers can use Google advanced operators and use it as
a powerful vulnerability search tool
• Advanced Google operators can be used to identify
sensitive information that shouldn’t be revealed.
Google
Advanced
Operators
UK - Cyber Defence Academy
• Specialist provider in bespoke classroom, online and self learning
cyber security and cyber defence training.
• Visit us on : www.tech-strategygroup.com
• Empower your employees to become aware about cyber security
• Implement bespoke cyber security training programmes for your
employees in alignment to your cyber security strategy,
transformation programmes and projects.
• For more information e-mail us on: info@tech-strategygroup.com

More Related Content

Similar to 7 Step Information Gathering Process

Web Tracking in cyber security and network security
Web Tracking in cyber security and  network securityWeb Tracking in cyber security and  network security
Web Tracking in cyber security and network securityHRJEETSINGH
 
Basic SEO by Andrea H. Berberich @webpresenceopti
Basic SEO by Andrea H. Berberich @webpresenceoptiBasic SEO by Andrea H. Berberich @webpresenceopti
Basic SEO by Andrea H. Berberich @webpresenceoptiAndrea Berberich
 
Tech Tools for Development Professionals
Tech Tools for Development ProfessionalsTech Tools for Development Professionals
Tech Tools for Development ProfessionalsFelicia
 
Google Analytics Training - full 2017
Google Analytics Training - full 2017Google Analytics Training - full 2017
Google Analytics Training - full 2017Nate Plaunt
 
EssilorIDD.com Intern Project 2014
EssilorIDD.com Intern Project 2014 EssilorIDD.com Intern Project 2014
EssilorIDD.com Intern Project 2014 Claire Mosley
 
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14Mark Goldstein
 
Accounting Information Systems
Accounting Information Systems Accounting Information Systems
Accounting Information Systems Tara Kissel, M.Ed
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017reconvillage
 
Top Web Scraping Service Provider For The Retail Data
Top Web Scraping Service Provider For The Retail DataTop Web Scraping Service Provider For The Retail Data
Top Web Scraping Service Provider For The Retail Dataretailgators
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todaySimeon Bala
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxsconalbg
 
ASLAPR Market Research for Entrepreneurs Presentation 5/13/14
ASLAPR Market Research for Entrepreneurs Presentation 5/13/14ASLAPR Market Research for Entrepreneurs Presentation 5/13/14
ASLAPR Market Research for Entrepreneurs Presentation 5/13/14Mark Goldstein
 
Social Media Recruitment PPT
Social Media Recruitment PPTSocial Media Recruitment PPT
Social Media Recruitment PPTSuman Banerjee
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...Alex Dunedin
 

Similar to 7 Step Information Gathering Process (20)

Web Tracking in cyber security and network security
Web Tracking in cyber security and  network securityWeb Tracking in cyber security and  network security
Web Tracking in cyber security and network security
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
Basic SEO by Andrea H. Berberich @webpresenceopti
Basic SEO by Andrea H. Berberich @webpresenceoptiBasic SEO by Andrea H. Berberich @webpresenceopti
Basic SEO by Andrea H. Berberich @webpresenceopti
 
Tech Tools for Development Professionals
Tech Tools for Development ProfessionalsTech Tools for Development Professionals
Tech Tools for Development Professionals
 
Google Analytics Training - full 2017
Google Analytics Training - full 2017Google Analytics Training - full 2017
Google Analytics Training - full 2017
 
EssilorIDD.com Intern Project 2014
EssilorIDD.com Intern Project 2014 EssilorIDD.com Intern Project 2014
EssilorIDD.com Intern Project 2014
 
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
Accounting Information Systems
Accounting Information Systems Accounting Information Systems
Accounting Information Systems
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017
 
Top Web Scraping Service Provider For The Retail Data
Top Web Scraping Service Provider For The Retail DataTop Web Scraping Service Provider For The Retail Data
Top Web Scraping Service Provider For The Retail Data
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptx
 
ASLAPR Market Research for Entrepreneurs Presentation 5/13/14
ASLAPR Market Research for Entrepreneurs Presentation 5/13/14ASLAPR Market Research for Entrepreneurs Presentation 5/13/14
ASLAPR Market Research for Entrepreneurs Presentation 5/13/14
 
communication
communicationcommunication
communication
 
ii mca juno
ii mca junoii mca juno
ii mca juno
 
Social Media Recruitment PPT
Social Media Recruitment PPTSocial Media Recruitment PPT
Social Media Recruitment PPT
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Session 12 digital tools to help
Session 12 digital tools to helpSession 12 digital tools to help
Session 12 digital tools to help
 
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
 

More from begmohsin

Skills you need to become a ethical hacker
Skills you need to become a ethical hackerSkills you need to become a ethical hacker
Skills you need to become a ethical hackerbegmohsin
 
Attackers process
Attackers processAttackers process
Attackers processbegmohsin
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
Types of hackers
Types of hackersTypes of hackers
Types of hackersbegmohsin
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma begmohsin
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques begmohsin
 
Defend your organisation from Cyber Attacks
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacksbegmohsin
 

More from begmohsin (7)

Skills you need to become a ethical hacker
Skills you need to become a ethical hackerSkills you need to become a ethical hacker
Skills you need to become a ethical hacker
 
Attackers process
Attackers processAttackers process
Attackers process
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
Types of hackers
Types of hackersTypes of hackers
Types of hackers
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
Defend your organisation from Cyber Attacks
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacks
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

7 Step Information Gathering Process

  • 1. Footprinting and Scanning- Seven Step Information Gathering Process
  • 2. Overview of the Seven Step Information – Gathering Process • Scope of footprinting comprises of collating information which can be in the form of it being passive or active • Deceptively phoning the helpdesk to elicit sensitive information is categorised as active information gathering. • Reviewing company information from a website is defined as passive footprinting. • Scope of scanning entails pinging machines, identifying network ranges, port scanning systems • EC Council developed a framework for footprinting and scanning into 7 steps
  • 3. Footprinting and Scanning Framework Information gathering Determining the network range Identifying active machines Finding open ports and access points OS fingerprinting Fingerprinting services Mapping the network attack surface
  • 4. 1. Information Gathering • Critical step within the process of footprinting and scanning • Information about companies can be elicited from company website, trade papers, financial databases or from ex employees etc • Developing a documentation with matrix fields such as domain name, IP address, DNS Servers, Employee information, e-mail addresses, IP Addresses, open ports etc can help you structure your analysis • Collating information about a website can typically comprise of the following: Company URL, Internal URL, Restricted URL, Internal Pages,
  • 5. Jobsites • Job sites can be used to collate valuable company information, most popular job boards are the following: Careerbuilder.com Monster.com Dice.com Indeed.com etc • Attackers can also use the following types of websites to collate information about people and employees: 1. Pipl: https://pipl.com/ Spokeo: 2. http://www.spokeo.com/ BirthdayDatabase.com: 3. http://www.birthdatabase.com/ 4. Whitepages: http://www.whitepages.com 5. People Search Now: http://www.peoplesearchnow.com/ 6. Zabasearch: http://www.zabasearch.com/ 7. Peoplefinders: http://www.peoplefinders.com/ 8. Justia email finder: http://virtualchase.justia.com/content/finding-email- addresses
  • 6. Social Networking • Social networking sites can also be utilised to collate people information: Facebook Twitter LinkedIn Google+ Pinterest etc • Financial Information about a company can be collated using the following websites: 1. Marketwatch: http://www.marketwatch.com 2. Experian: http://www.experian.com 3. Wall Street Consensus Monitor: http://www.wallstreetconsensusmonitor.com/ 4. Euromonitor: http://www.euromonitor.com
  • 7. Basic Google Hacking • Google as a search engine can be pursued to perform detailed searches on people • Google search engine has the powerful capabilities to translate documents, perform new searches and do image searches. • Hackers can use Google advanced operators and use it as a powerful vulnerability search tool • Advanced Google operators can be used to identify sensitive information that shouldn’t be revealed.
  • 9.
  • 10. UK - Cyber Defence Academy • Specialist provider in bespoke classroom, online and self learning cyber security and cyber defence training. • Visit us on : www.tech-strategygroup.com • Empower your employees to become aware about cyber security • Implement bespoke cyber security training programmes for your employees in alignment to your cyber security strategy, transformation programmes and projects. • For more information e-mail us on: info@tech-strategygroup.com