This document provides an overview of footprinting techniques and tools. It discusses gathering information about computer systems, networks, organizations and individuals through methods such as DNS queries, network scanning, search engines, social media, job sites and WHOIS lookups. A variety of free online tools are listed for extracting data from web pages, performing people searches, monitoring targets, competitive intelligence, DNS queries, tracing routes, mirroring websites and tracking emails. The document is intended to share the author's knowledge about footprinting and related cybersecurity techniques.
Почему Kardex?
Kardex предоставляет широкий спектр решений для систем автоматического складского хранения, каждое из которых направлено на увеличение эффективности складских операций и уменьшение пространства используемого для хранения материалов. Так почему же, все-таки, Kardex?
Artificial Intelligence Explained: What Are Generative Adversarial Networks (...Bernard Marr
There are many new developments in the field of artificial intelligence, and one of the most exciting and transformative ideas are Generative Adversarial Networks (GANs). Here we explain in simple terms what they are.
Почему Kardex?
Kardex предоставляет широкий спектр решений для систем автоматического складского хранения, каждое из которых направлено на увеличение эффективности складских операций и уменьшение пространства используемого для хранения материалов. Так почему же, все-таки, Kardex?
Artificial Intelligence Explained: What Are Generative Adversarial Networks (...Bernard Marr
There are many new developments in the field of artificial intelligence, and one of the most exciting and transformative ideas are Generative Adversarial Networks (GANs). Here we explain in simple terms what they are.
Recruiting for Tech Talent on Social Media #LDNTechWeekJohnny Campbell
How do you find, recruit, assess, attract and engage with top tech talent on places liked LinkedIn, Github, StackOverflow, Twitter, Facebook and more!
As presented at ITJobBoard's HQ in London for London Tech Week 2015
Predictive Modelling is used by businesses, social organisations and governments to build winning products, eradicate poverty and preempt cyclones. Learn the fundamental principles of predictive modelling with illustrative case studies. Know how companies like Netflix, Tinder and Citi Group use predictive modelling to deliver user satisfaction and profitability.
The Best Web Scraping Tool To Scrape Data From LinkedIn.pdfAqsaBatool21
LinkedIn Company Extractor is a web scraping tool that collects vital information from LinkedIn company pages.
It makes it easier to extract information on firms, their workers, and their platform activities.
2
2
2
1
1
1
Organization Name: Insta-Buy
Insta-Buy is an E-Commerce Multinational American company. It was founded in 2010 and is based in Atlanta, Georgia. It mainly operates with grocery delivery and pick up and it offers services through web application and mobile application to various states in United States. It is one of the major online marketplaces for grocery delivery. The company is valued at $1 billion worth and has partnership with over 150 retailers. It is known for its fresh produce and timely delivery and pickup.
Predictive Analysis at Insta-Buy:
The predictive analytics is termed as what is likely to happen in the future. The predictive analytics is based on statistical and data mining technique. The aim of this technique is to predict the future of the project such as what would be the customer reaction on project, financial need, etc. In developing predictive analytical application, a number of techniques are used such as classification algorithms. The classification techniques are logistic regression, decision tree models and neural network. Clustering algorithms are used to segment customers in different groups which helps to target specific promotions to them. To estimate the relationship between different purchasing behavior, association mining technique is used (Mehra, 2014). As an example, for any product on Amazon.com results in the retailer also suggesting similar products that a customer might be interested in. Predictive analytics can be used in E-commerce to solve the following problems
1. Improve customer engagement and increase revenue
1. Launch promotions that target specific customer group
1. Optimizing prices to generate maximum profits
1. Keep proper inventory and reduce over stalking
1. Minimizing fraud happenings and protecting privacy
1. Provide batter customer service at low cost
1. Analyze data and make decision in real time
TOPICS:
Student: Ahmed
Topic: Bayesian Networks (Predicting Sales In E-commerce Using Bayesian Network Model)
Student: Meet
Topic: Predictive Analysis
Student: Peter
Topic: Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation
Student: Nayeem
Topic: Ensemble Modeling
Student: Shek
Topic: L.Jack & Y.D. Tsai, Using Text Mining of Amazon Reviews to Explore User-Defined Product Highlights and Issues.
Student: Suma
Topic: Deep Neural Networks
REFERENCES:
Olufunke Rebecca Vincent, A. S. (2017). A Cognitive Buying Decision-Making Process in B2B E-Commerce Using Analytic-MLP. Elsevier.
https://www.researchgate.net/publication/319278239_A_Cognitive_Buying_Decision-Making_Process_in_B2B_E-Commerce_Using_Analytic-MLP
Wan, C. C. (2017). Forcasting E-commerce Key Performance Indicators
https://beta.vu.nl/nl/Images/stageverslag-wan_tcm235-867619.pdf
Fienberg, S. (2006). Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation. Statistical Science, .
Internet digital business development talk at the University of Denver Franklin L. Burns School of Real Estate and Construction Management given by Jeff Bernard
Relational databases were conceived to digitize paper forms and automate well-structured business processes, and still have their uses. But, oftentimes with RDBMS, performance degrades with the increasing number and levels of data relationships and data size.
A graph database like Neo4j naturally stores, manages, analyzes, and uses data within the context of connections meaning Neo4j provides faster query performance and vastly improved flexibility in handling complex hierarchies than SQL.
This webinar explains why companies are shifting away from RDBMS towards graphs to unlock the business value in their data relationships.
Top Web Scraping Service Provider For The Retail Dataretailgators
We provide the best web scraping services worldwide and stay at the top for offering personalized analysis and web scraping solutions for all types and sizes of businesses.
A presentation delivered in Sydney Australia on existing web technology and some of the newer emerging web technologies and how to use them in your business
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Recruiting for Tech Talent on Social Media #LDNTechWeekJohnny Campbell
How do you find, recruit, assess, attract and engage with top tech talent on places liked LinkedIn, Github, StackOverflow, Twitter, Facebook and more!
As presented at ITJobBoard's HQ in London for London Tech Week 2015
Predictive Modelling is used by businesses, social organisations and governments to build winning products, eradicate poverty and preempt cyclones. Learn the fundamental principles of predictive modelling with illustrative case studies. Know how companies like Netflix, Tinder and Citi Group use predictive modelling to deliver user satisfaction and profitability.
The Best Web Scraping Tool To Scrape Data From LinkedIn.pdfAqsaBatool21
LinkedIn Company Extractor is a web scraping tool that collects vital information from LinkedIn company pages.
It makes it easier to extract information on firms, their workers, and their platform activities.
2
2
2
1
1
1
Organization Name: Insta-Buy
Insta-Buy is an E-Commerce Multinational American company. It was founded in 2010 and is based in Atlanta, Georgia. It mainly operates with grocery delivery and pick up and it offers services through web application and mobile application to various states in United States. It is one of the major online marketplaces for grocery delivery. The company is valued at $1 billion worth and has partnership with over 150 retailers. It is known for its fresh produce and timely delivery and pickup.
Predictive Analysis at Insta-Buy:
The predictive analytics is termed as what is likely to happen in the future. The predictive analytics is based on statistical and data mining technique. The aim of this technique is to predict the future of the project such as what would be the customer reaction on project, financial need, etc. In developing predictive analytical application, a number of techniques are used such as classification algorithms. The classification techniques are logistic regression, decision tree models and neural network. Clustering algorithms are used to segment customers in different groups which helps to target specific promotions to them. To estimate the relationship between different purchasing behavior, association mining technique is used (Mehra, 2014). As an example, for any product on Amazon.com results in the retailer also suggesting similar products that a customer might be interested in. Predictive analytics can be used in E-commerce to solve the following problems
1. Improve customer engagement and increase revenue
1. Launch promotions that target specific customer group
1. Optimizing prices to generate maximum profits
1. Keep proper inventory and reduce over stalking
1. Minimizing fraud happenings and protecting privacy
1. Provide batter customer service at low cost
1. Analyze data and make decision in real time
TOPICS:
Student: Ahmed
Topic: Bayesian Networks (Predicting Sales In E-commerce Using Bayesian Network Model)
Student: Meet
Topic: Predictive Analysis
Student: Peter
Topic: Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation
Student: Nayeem
Topic: Ensemble Modeling
Student: Shek
Topic: L.Jack & Y.D. Tsai, Using Text Mining of Amazon Reviews to Explore User-Defined Product Highlights and Issues.
Student: Suma
Topic: Deep Neural Networks
REFERENCES:
Olufunke Rebecca Vincent, A. S. (2017). A Cognitive Buying Decision-Making Process in B2B E-Commerce Using Analytic-MLP. Elsevier.
https://www.researchgate.net/publication/319278239_A_Cognitive_Buying_Decision-Making_Process_in_B2B_E-Commerce_Using_Analytic-MLP
Wan, C. C. (2017). Forcasting E-commerce Key Performance Indicators
https://beta.vu.nl/nl/Images/stageverslag-wan_tcm235-867619.pdf
Fienberg, S. (2006). Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation. Statistical Science, .
Internet digital business development talk at the University of Denver Franklin L. Burns School of Real Estate and Construction Management given by Jeff Bernard
Relational databases were conceived to digitize paper forms and automate well-structured business processes, and still have their uses. But, oftentimes with RDBMS, performance degrades with the increasing number and levels of data relationships and data size.
A graph database like Neo4j naturally stores, manages, analyzes, and uses data within the context of connections meaning Neo4j provides faster query performance and vastly improved flexibility in handling complex hierarchies than SQL.
This webinar explains why companies are shifting away from RDBMS towards graphs to unlock the business value in their data relationships.
Top Web Scraping Service Provider For The Retail Dataretailgators
We provide the best web scraping services worldwide and stay at the top for offering personalized analysis and web scraping solutions for all types and sizes of businesses.
A presentation delivered in Sydney Australia on existing web technology and some of the newer emerging web technologies and how to use them in your business
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
2. Footprinting - RAJ CHANDEL
2011
Table of Contents
1. What is Footprinting................................................................................. 5
2. Tools of Extract Data.................................................................................6
3. People Search Online Services................................................................... 9
4. Footprinting through Search engines……………………………………………………….. 12
5. People Search on Social Networking Sites.................................................. 14
6. Gather Information from Financial Services................................................17
7. Monitoring Target Using Alert................................................................... 18
8. People Search through Job sites………………………………………………………………..19
9. Competitive Intelligence…………………………………………………………………………. 21
10. Whois…………………………………………………………………………………………………… 24
11. Find Website details using Command prompt………………………………………...25
12. Extracting DNS Information…………………………………………………………………….27
13. Trace Route……………………………………………………………………………………………30
14. Website Mirroring Tools…………………………………………………………………………33
15. Extract Website Information…………………………………………………………………..36
16. Email Tracking Tool………………………………………………………………………………..37
17. Availability Of your name……………………………………………………………………....39
Copyright www.hackingtutorial.net
Page 2
3. Footprinting - RAJ CHANDEL
2011
ACKNOWLEDGEMENT
“For any successful work, it owes to thank many”
No one walks alone & when one is walking on the journey of life just where you start to thank
those that joined you, walked beside you & helped you along the way.
Over the years, those that I have met & worked with have continuously urged me to write a
book, to share me knowledge & skills on paper & to share my insights together with the secrets
to my continual, positive approach to life and all that life throws at us. So at last, here it is.
So, perhaps this book & it’s pages will be seen as “thanks” to the tens of thousands of you who
have who have helped to make my life what is today.
Hard work, knowledge, dedication & positive attitude all are necessary to do any task
successfully but one ingredient which is also very important than others is co-operation &
guidance of experts & experienced person.
All the words is lexicon futile & meaningless if I fail to express my sense of regard to my parents
& sister for their sacrifices, blessings, prayers, everlasting love & pain & belief in me.
I also want to thanks my friend Ankit, Ankur & Sonal for their support.
I solely claim all the responsibility for any shortcomings & limitations in this book .
Copyright www.hackingtutorial.net
Page 3
4. Footprinting - RAJ CHANDEL
2011
Legal Disclaimer
The information provided in this eBook is to be used for educational purposes only. The author
holds no responsibility for any misuse of the information provided. This book is totally meant
for providing information on "Footprinting”,
About the Author
Raj Chandel started his career at a very young age of 18 since then he has performed the roles of
experienced Ethical Hacker, Cyber Security Expert, and Penetration Tester. He has also served IT
industry by taking care of Network Security, System Security, and SEM with a firsthand experience of
3 years in Web Development, Ethical Hacking and Internet marketing.
Contact me:
raj@hackingarticles.in
www.hackingarticles.in
www.hackingtutorial.net
Copyright www.hackingtutorial.net
Page 4
5. 2011
Footprinting - RAJ CHANDEL
Footprinting
Footprinting is the technique of gathering information about computer systems and the
entities they belong to. This is done by employing various computer security techniques, as:
DNS queries
Network enumeration
Network queries
Operating system identification
Organizational queries
Ping sweeps
Point of contact queries
Port Scanning
Registrar queries (WHOIS queries)
SNMP queries
World Wide Web spidering
Footprinting Methodology
Collect Network Information
Collect Organization’s
Information
Networking Protocol
VPN Points
ACLs
IDSes Running
Analog/Digital Tel. Numbers
Authentication mechanisms
System architecture
Remote System Type
System Names
Passwords
Employee Details
Organization’s Website
Company Directory
Collect System Information
Domain Name
Internal Domain Name
Network Blocks
IP Address of the reachable system
Rogue Website/Private Website
TCP and UDP Services Running
Users and Groups names
System Banners
Routing Banners
SNMP Information
Addresses and Phone
Numbers
Background on the
organization
News articles/Press releases
Copyright www.hackingtutorial.net
Page 5
6. Footprinting - RAJ CHANDEL
2011
Tools of Extract Data (Extract Information from Web Page)
Web Data Extractor: Web Data Extractor, a powerful and easy-to-use application which
helps you automatically extract specific information from web pages.
www.webextractor.com
Copyright www.hackingtutorial.net
Page 6
7. Footprinting - RAJ CHANDEL
2011
Spider Foot:
Spider Foot is a free, open-source, domain footprinting tool. Given one or
multiple domain names (and when I say domains, I'm referring to the DNS kind, not Windows
domains), it will scrape the websites on that domain, as well as search Google, Netcraft, Whois
and DNS to build up information like:
Sub domains
Affiliates
Web server versions
Users
Similar domains
Email addresses
Net blocks
www.binarypool.com
Copyright www.hackingtutorial.net
Page 7
8. Footprinting - RAJ CHANDEL
2011
Robtex: RobTex is a software developer which was founded in 1989 developing all kinds of
software. In recent years main focus has been on Internet related software. Currently the most
popular has been free tools like rbls.org and network explorer.
www.robtex.com
Copyright www.hackingtutorial.net
Page 8
9. Footprinting - RAJ CHANDEL
2011
People Search Online Services
Pipl People Find
www.pipl.com
Yahoo People Search
People.yahoo.com
Copyright www.hackingtutorial.net
Page 9
10. Footprinting - RAJ CHANDEL
2011
Profile Search by Email
www.lullar.com
People Lookup
www.peoplelookup.com
Copyright www.hackingtutorial.net
Page 10
11. Footprinting - RAJ CHANDEL
2011
123 People Search
www.123peoplesearch.com
Public People Finder
www.publicpeoplefinder.com
Copyright www.hackingtutorial.net
Page 11
12. Footprinting - RAJ CHANDEL
2011
Footprinting through Search Engine
Google
www.google.com
Yahoo
www.yahoo.com
Copyright www.hackingtutorial.net
Page 12
17. Footprinting - RAJ CHANDEL
2011
Gather Information from Financial Services
Google Finance
http://www.google.com/finance
Yahoo Finance
http://in.finance.yahoo.com
Copyright www.hackingtutorial.net
Page 17
18. Footprinting - RAJ CHANDEL
2011
Monitoring Target using Alert
Giga Alert:
The web's leading solution for monitoring your professional interests online.
Track the entire web for your topics and receive new results by daily email.
www.gigaalert.com
Google Alert: Google Alerts are email updates of the latest relevant Google results (web,
news, etc.) based on your choice of query or topic .
http://www.google.com/alerts
Copyright www.hackingtutorial.net
Page 18
19. Footprinting - RAJ CHANDEL
2011
People Search on JOB Search Sites
Naukri
www.naukri.com
Monster
www.monster.com
Copyright www.hackingtutorial.net
Page 19
20. 2011
Footprinting - RAJ CHANDEL
JobsDB
www.jobsdb.com
Shine
www.shine.com
Freshers World
www.fresherworld.com
Times Jobs
www.timesjobs.com
Shiksha
www.shiksha.com
Copyright www.hackingtutorial.net
Page 20
21. 2011
Footprinting - RAJ CHANDEL
Competitive Intelligence
A broad definition of competitive intelligence is the action of defining, gathering, analyzing,
and distributing intelligence about products, customers, competitors and any aspect of the
environment needed to support executives and managers in making strategic decisions for an
organization.
Key points of this definition:
Competitive intelligence is an ethical and legal business practice, as opposed
to industrial espionage which is illegal.
The focus is on the external business environment.
There is a process involved in gathering information, converting it into intelligence and
then utilizing this in business decision making. CI professionals erroneously emphasize
that if the intelligence gathered is not usable (or actionable) then it is not intelligence.
ABI/Inform `Global
www.proquest.com
Factiva
www.factiva.com
Business Wire
www.businesswire.com
Market Watch
www.marketwatch.com
Websitez
www.websitez.com
Competitive Intelligence Tools
SEC Info
www.secinfo.com
Business Wire
www.businesswire.com
C-SPAN
www.cspan.org
CNN Money Company Research
www.money.cnn.com
Web Investigator
www.web-investigator.net
Copyright www.hackingtutorial.net
Page 21
24. 2011
Footprinting - RAJ CHANDEL
WHOis
Whois: Whois is a protocol used to find information about networks, domains and hosts.
WHOIS databases for domain registration information. By performing a simple WHOIS search
you can discover when and by whom a domain was registered, contact information, and more.
Whois Lookup Tools
You Get Signal
www.yougetsignal.com
MY IP Suite
www.sabsoft.com
Lan Whois
www.lantricks.com
DNSDataView
www.nirsoft.net
Lapshins Whois
www.lapshins.com
Domain Hosting View
www.nirsoft.net
Web Ferret
www.webferret.com
Whois Lookup Online Tools
Whois
www.whois.net
Better Whois
www.betterwhois.com
Domain Tools
www.domaintools.com
IP Tools
www.iptools.com
Copyright www.hackingtutorial.net
Page 24
25. Footprinting - RAJ CHANDEL
2011
Find Website Details using Command Prompt
nslookup is a network administration command-line tool available for many computer
operating systems for querying the Domain Name System (DNS) to obtain domain name or IP
address mapping or for any other specific DNS record.
Find MX Record
nslookup -type=mx www.example.com
Find NS Record
nslookup -type=ns www.example.com
Copyright www.hackingtutorial.net
Page 25
26. Footprinting - RAJ CHANDEL
2011
Find SOA Record
nslookup -type=soa www.example.com
Find A Record
nslookup -type=a www.example.com
Copyright www.hackingtutorial.net
Page 26
27. 2011
Footprinting - RAJ CHANDEL
Extracting DNS Information
Code
Number
Defining
RFC
Description
Function
1
RFC
1035
address
record
Returns a 32-bit IPv4 address, most
commonly used to map hostnames to an
IP address of the host, but also used
forDNSBLs, storing subnet masks in RFC
1101, etc.
AAAA
28
RFC
3596
IPv6 address
record
Returns a 128-bit IPv6 address, most
commonly used to map hostnames to an
IP address of the host.
APL
42
RFC
3123
Address
Prefix List
Specify lists of address ranges, e.g. in
CIDR format, for various address
families. Experimental.
5
RFC
1035
Canonical
name record
Alias of one name to another: the DNS
lookup will continue by retrying the
lookup with the new name.
MX
15
RFC
1035
mail
exchange
record
Maps a domain name to a list
of message transfer agents for that
domain
NS
2
RFC
1035
name server
record
Delegates a DNS zone to use the
given authoritative name servers
A
CNAME
SOA
6
RFC
1035
start of
authority
record
Specifies authoritative information about
a DNS zone, including the primary name
server, the email of the domain
administrator, the domain serial
number, and several timers relating to
refreshing the zone.
TXT
16
RFC
1035
Text record
Originally for arbitrary humanreadable text in a DNS record. Since the
early 1990s, however, this record
SRV
33
RFC
2782
Service
locator
Generalized service location record, used
for newer protocols instead of creating
protocol-specific records such as MX.
Copyright www.hackingtutorial.net
Page 27
30. Footprinting - RAJ CHANDEL
2011
Trace Route
Traceroute: Traceroute is the program that shows you the route over the network between
two systems, listing all the intermediate routers a connection must pass through to get to its
destination. It can help you determine why your connections to a given server might be poor,
and can often help you figure out where exactly the problem is. It also shows you how systems
are connected to each other, letting you see how your ISP connects to the Internet as well as
how the target system is connected.
3D Traceroute
www.d3tr.de
Copyright www.hackingtutorial.net
Page 30
33. Footprinting - RAJ CHANDEL
2011
Website Mirroring Tools
HTTRack:
HTTRack is a free (GPL, libre/free software) and easy-to-use offline browser utility. It
allows you to download a World Wide Web site from the Internet to a local directory, building
recursively all directories, getting HTML, images, and other files from the server to your computer.
www.httrack.com
Web Snake: WebSnake is the world's most powerful off-line browser designed exclusively
for Windows Platform. In addition to off-line browsing, WebSnake is unique in that it uses our
proprietary "intelligent pull" technology to search and retrieve files from the World Wide Web
www.websnake.com
Copyright www.hackingtutorial.net
Page 33
34. Footprinting - RAJ CHANDEL
2011
Surfonline:
Surf Offline is fast and convenient website download software. The software allows
you to download entire websites and download web pages to your local hard drive.
www.surfonline.com
Copyright www.hackingtutorial.net
Page 34
35. 2011
Footprinting - RAJ CHANDEL
PageNest:
Copy your favorite WebPages to hard disk with PageNest. Give PageNest the
address of a website and it will copy either the page or the entire site (whichever you prefer) to
your hard disk. It will create an exact copy of what you see in your browser including the text,
html, images and css.
www.pagenest.com
Mirroring Entire Website Tools
Black Window
www.softbytelabs.com
Wget
www.gnu.org
Reamweaver
www.reamweaver.com
Website Riper Copier
www.tensons.com
WinWsd
www.winwsd.uw.hu
Teleport Pro
www.tenmax.com
Copyright www.hackingtutorial.net
Page 35
37. Footprinting - RAJ CHANDEL
2011
Email-Tracking Tool
Online Email Tracer:
Email Tracer is a tool to track email sender’s identity. It analyzes
the email header and gives the complete details of the sender like IP address, which is key point
to find the culprit and the route followed by the mail, the Mail Server, details of Service
Provider etc. Email Tracer traces up to Internet Service Provider level only. Further tracing can
be done with the help of ISP and law enforcement agencies. The message-id will be useful for
analyzing the mail logs at ISP.
http://www.cyberforensics.in/OnlineEmailTracer/index.aspx
Copyright www.hackingtutorial.net
Page 37
38. Footprinting - RAJ CHANDEL
2011
Read Notify: ReadNotify is the original tracking service of its kind, and remains the most
powerful and reliable email and document tracking service in the world today. In short ReadNotify tells you when your tracked emails and documents are opened / re-opened /
forwarded and so much more.
www.readnotify.com
Didtheyreadit:
DidTheyReadIt is a leader in providing a low cost, easy to use email tracking
service. In the last few years we have been featured internationally in newspapers, magazines, and
television and our services are used by some of the largest corporations in the world. We are based in
Houston, Texas and have branch offices throughout the world.
www.didtheyreadit.com
Copyright www.hackingtutorial.net
Page 38
39. Footprinting - RAJ CHANDEL
2011
PoltiteMail: PoliteMail is software tools for Microsoft Outlook and Exchange. Our PoliteMail for
Outlook client software adds the tracking tools and marketing features you want in Outlook and
connects to the PoliteMail Server, which collects the tracking data 24/7.
www.politemail.com
Email Tracker pro: EmailTrackerPro can trace any email back to its true geographical locaction*
by using the email header. The header of an email provides the key details about where an email came
from and if it is likely to be spam.
www.visualware.com
Copyright www.hackingtutorial.net
Page 39
40. Footprinting - RAJ CHANDEL
2011
Availability of your name in the Most popular SocialSites
Name Check: Namecheck provides you with a free search report to reveal if your brand has been
taken as a domain name, social media username or trademark.
www.namecheck.com
Directory of Search Engines
www.searchenginecolossus.com
Copyright www.hackingtutorial.net
Page 40