SlideShare una empresa de Scribd logo
1 de 29
./whoami
0 If You want to Hack some one First Hack Your self.
0 I am NOT a Hacker Just Learner as Security analyst.
Information Gathering
0 “If you know the enemy and know yourself you need

not fear the results of a hundred battles”
Session Flow
0 Information Gathering- Definition
0 Initial Info gathering of websites.
0 IP range Lookup
0 DNS information gathering.
0 Web Hosting info gathering.
0 Understanding hosting control Panels.
0 Subdomains.
0 Whois information.
Session Flow
0 Info Gathering using blogs & forums.
0 Info Gathering using search Engine
0 Info Gathering using Meta tags & Words.
0 People Search.
0 Info gathering using job portal websites.
What is Information
Gathering?
0 Information gathering is the process of collecting the

information from different places about any individual
company, organization, server, IP address or person.

0 Information gathering is the first step of hacking and most

of the time of hacker spend his time in this process. 90% of
time of a hacker spend in information gathering.

0 Information gathering plays a very vital role for both

investigating and attacking purposes.
Attacker’s Point of View
0 Attacker will first gather information like domain name, IP

address, IP range, operating system, services, control
panel, vulnerable services etc and later on exploit it.

0 Attackers use tools and social engineering to gather

information.

0 For attacking an individual person he will find his name,

address, date of birth, phone no and his personal
information and then use that information for attacking
that person.
Investigator’s Point of View
0 As an investigator information gathering is powerful

tool used in investigation.

0 Investigator will gather information like traces of

criminal, name, address, contact no, company
information etc before taking any legal action.

0 Investigators use tools and social networking sites to

gather information about criminal.
Whois
0 Whois is query to database to get following

information.

1. Owner of website.
2. Email id used to register domain.
3. Domain registrar.
4. Domain name server information.
5. Related websites
Whois

Whois.net has official database of all domains.
Whois
Reverse IP mapping
0 Reverse IP will give number of websites hosted on same

server.
0 If one website is vulnerable on the server then hacker

can easily root the server.
Trace Route
0 Trace route gives useful information regarding number of

servers between your computers & remote computers.
0 Useful for investigation as well as different attacks.
0 Visualroute, Neotrace.
Trace Route
Info. Gathering using Search
Engine
0 Search engines are efficient mediums to get specific

results according to your requirements.
0 Google, yahoo, bing etc..
0 search engine gives best results out of all.
Info Gathering Using Search
Engine
0 Maltego is an open source intelligence and forensics

application.

0 It allows for the mining and gathering of information as

well as the representation of this information in a
meaningful way.

0 Coupled with its graphing libraries, Maltego, allows you to

identify key relationships between information and
identify previously unknown relationships between them.
Maltego
Information gathering using
forum/blogs
• Almost 80% internet users use blogs/forums for

knowledge sharing purpose.
• Information gathering from specific blog will also helpful

in investigations.
Information gathering using
Jobs site
Information Gathering Using Financial
Services
Google Finance

Yahoo Finance
Info Gathering using Google
Maps
Information gathering using SN
Website
People Search
Information gathering using ESpiders
0 Email Spiders are automated soft wares which

captures email ids using spiders & store them on the
database. Spammers are using email spiders to collect
thousand emails for spamming purposes.
Monitoring Targets Using
Google Alerts
0 Google Alerts is a content monitoring service that

automatically notifies users when new content from
news, web, blogs, video and/or discussion groups
matches a set of search terms selected by the & stored
by the Google Alerts Service.

0 Google Alerts help in monitoring a developing news

story & keeping current on a competitor or industry.
Google Alerts
Information gathering using
Web Archive
0 Archive.org maintains logs of pages of website.
!! For Regarding any question contact me !!
http://www.maulikkotak.webnode.com
http://www.facebook.com/maulikkotakstar
http://www.twitter.com/maulikkotakstar

Más contenido relacionado

La actualidad más candente

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 

La actualidad más candente (20)

SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Nessus Basics
Nessus BasicsNessus Basics
Nessus Basics
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
Footprinting
FootprintingFootprinting
Footprinting
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Whitman_Ch05.pptx
Whitman_Ch05.pptxWhitman_Ch05.pptx
Whitman_Ch05.pptx
 
этичный хакинг и тестирование на проникновение (Publ)
этичный хакинг и тестирование на проникновение (Publ)этичный хакинг и тестирование на проникновение (Publ)
этичный хакинг и тестирование на проникновение (Publ)
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring
 

Similar a Information gathering

Similar a Information gathering (20)

security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Information gatherimg
Information gatherimgInformation gatherimg
Information gatherimg
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Information gathering

  • 1.
  • 2. ./whoami 0 If You want to Hack some one First Hack Your self. 0 I am NOT a Hacker Just Learner as Security analyst.
  • 3. Information Gathering 0 “If you know the enemy and know yourself you need not fear the results of a hundred battles”
  • 4. Session Flow 0 Information Gathering- Definition 0 Initial Info gathering of websites. 0 IP range Lookup 0 DNS information gathering. 0 Web Hosting info gathering. 0 Understanding hosting control Panels. 0 Subdomains. 0 Whois information.
  • 5. Session Flow 0 Info Gathering using blogs & forums. 0 Info Gathering using search Engine 0 Info Gathering using Meta tags & Words. 0 People Search. 0 Info gathering using job portal websites.
  • 6. What is Information Gathering? 0 Information gathering is the process of collecting the information from different places about any individual company, organization, server, IP address or person. 0 Information gathering is the first step of hacking and most of the time of hacker spend his time in this process. 90% of time of a hacker spend in information gathering. 0 Information gathering plays a very vital role for both investigating and attacking purposes.
  • 7. Attacker’s Point of View 0 Attacker will first gather information like domain name, IP address, IP range, operating system, services, control panel, vulnerable services etc and later on exploit it. 0 Attackers use tools and social engineering to gather information. 0 For attacking an individual person he will find his name, address, date of birth, phone no and his personal information and then use that information for attacking that person.
  • 8. Investigator’s Point of View 0 As an investigator information gathering is powerful tool used in investigation. 0 Investigator will gather information like traces of criminal, name, address, contact no, company information etc before taking any legal action. 0 Investigators use tools and social networking sites to gather information about criminal.
  • 9. Whois 0 Whois is query to database to get following information. 1. Owner of website. 2. Email id used to register domain. 3. Domain registrar. 4. Domain name server information. 5. Related websites
  • 10. Whois Whois.net has official database of all domains.
  • 11. Whois
  • 12. Reverse IP mapping 0 Reverse IP will give number of websites hosted on same server. 0 If one website is vulnerable on the server then hacker can easily root the server.
  • 13. Trace Route 0 Trace route gives useful information regarding number of servers between your computers & remote computers. 0 Useful for investigation as well as different attacks. 0 Visualroute, Neotrace.
  • 15. Info. Gathering using Search Engine 0 Search engines are efficient mediums to get specific results according to your requirements. 0 Google, yahoo, bing etc.. 0 search engine gives best results out of all.
  • 16. Info Gathering Using Search Engine 0 Maltego is an open source intelligence and forensics application. 0 It allows for the mining and gathering of information as well as the representation of this information in a meaningful way. 0 Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them.
  • 18. Information gathering using forum/blogs • Almost 80% internet users use blogs/forums for knowledge sharing purpose. • Information gathering from specific blog will also helpful in investigations.
  • 20. Information Gathering Using Financial Services Google Finance Yahoo Finance
  • 21. Info Gathering using Google Maps
  • 24. Information gathering using ESpiders 0 Email Spiders are automated soft wares which captures email ids using spiders & store them on the database. Spammers are using email spiders to collect thousand emails for spamming purposes.
  • 25.
  • 26. Monitoring Targets Using Google Alerts 0 Google Alerts is a content monitoring service that automatically notifies users when new content from news, web, blogs, video and/or discussion groups matches a set of search terms selected by the & stored by the Google Alerts Service. 0 Google Alerts help in monitoring a developing news story & keeping current on a competitor or industry.
  • 28. Information gathering using Web Archive 0 Archive.org maintains logs of pages of website.
  • 29. !! For Regarding any question contact me !! http://www.maulikkotak.webnode.com http://www.facebook.com/maulikkotakstar http://www.twitter.com/maulikkotakstar