Active- and -passive- information- gathering -Techniques
ethical hacking

Active and passive information gathering Techniques in [ethical hacking]

Active and passive information gathering Techniques

Hello all in this  article we will learn  about information gather techniques  in ethical hacking why it is very important  for learning ethical hackers  in this article we will clarify all the details about information gather techniques

what is information gathering :-   information gathering is a phase in which hacker gather information about the target   before hacking .more information we gather about the target, the more it will be useful to us, as there will be more attack covering available to us

Active- and -passive- information- gathering -Techniques

 

Active Information Gathering

In active information gathering, we would directly engage with the target, for example, gathering information about what ports are open on a particular target, what services they are running, and what operating system they are using. However, the techniques involving active information gathering would be very noisy at the other end. As they are easily detected by IDS, IPS, and firewalls and generate a log of their presence, and hence are not recommended sometimes.

The Ultimate Guide To Learn Hacking For Beginners- Start Learn Hacking

Passive Information Gathering

In passive information gathering, we do not directly engage with the target. Instead, we use search engines, social media, and other websites to gather information about the target. This method Ethical Hacking and Penetration Testing Guide is recommended, since it does not generate any log of presence on the target system. A common example would be to use LinkedIn, Facebook, and other social networks to gather information about the employees and their interests. This would be very useful when we perform phishing, keylogging, browser exploitation, and other client side attacks on the employees.

Different sources of information gathering:-

Passive Information Gathering

In passive information gathering, we do not directly engage with the target. Instead, we use search engines, social media, and other websites to gather information about the target. This method Ethical Hacking and Penetration Testing Guide is recommended, since it does not generate any log of presence on the target system. A common example would be to use LinkedIn, Facebook, and other social networks to gather information about the employees and their interests. This would be very useful when we perform phishing, keylogging, browser exploitation, and other client side attacks on the employees.

Different sources of information gathering:-

  • Social media website
  • Job sites
  • Search engines
  • Forums
  • Press releases
  • People search

Learn Linux programmming Language for free For beginners

Passive Information Gathering

In passive information gathering, we do not directly engage with the target. Instead, we use search engines, social media, and other websites to gather information about the target. This method Ethical Hacking and Penetration Testing Guide is recommended, since it does not generate any log of presence on the target system. A common example would be to use LinkedIn, Facebook, and other social networks to gather information about the employees and their interests. This would be very useful when we perform phishing, keylogging, browser exploitation, and other client side attacks on the employees.

Different sources of information gathering:-

  • Social media website
  • Job sites
  • Search engines
  • Forums
  • Press releases
  • People search

 

Active- and -passive-information -gathering -Techniques

you can easily download this tool via this link   httrack download 

 

By this trick u can easily copy any websites

 

second techniques to copy websites locally

 

one of my best software to learn ethical hacking   by this software you an easily  copy the  websites locally 

 this article is for knowledge base if you want this tricks  please comment box 

 

 

Information gathering 

what is information gathering:-  the information gathering and enumeration phase is to
gather as much information as possible about the target. Who is holds a huge database that contains
information regarding almost every website that is on the web, most common information
are  who owns the website and the e-mail of the owner which can be used to perform social
engineering attacks

 

 

you can easily for the who is for getting the victim details :

if you have backtrack or Kali Linux you can easily  get information about the victim :

1:- open the terminal and type   whois. +domain name

if you get any error then type the following command [apt-get install whois] this command will install who is on your machine

 

i hope u will love this article    

 

 

 

Ransomware Attack How To Prevent From Ransomware Attack [Best Tricks ]

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.