Infolinks In Text Ads

Friday, 15 March 2013

Information Gathering Methodology part two

Information Gathering

 Methodology



1.       The attacker would first unearth initial information (such as domain name).
2.       locate the network range of the target system (using tools such as Nslookup, whois etc).
3.       Ascertain the active machines (for instance by pinging the machine).
4.       discover open ports or access points (using tools such as port scanners).
5.       Detect operating systems (for instance querying with telnet).
6.       Uncover services on ports and
7.       Map the network.

Extracting Archive of a Website



You can get all information of a company’s website since the time it was launched at archive

 Footprinting (Part 1)

People Search

 Footprinting (Part 1)

Best People Search

 Footprinting (Part 1)

bestpeoplesearch


Profile Search by Email

 Footprinting (Part 1)

lullar


Name Check



 Footprinting (Part 1)

Namecheck

Footprinting Through Job Sites



 Footprinting (Part 1)

naukri


 Footprinting (Part 1)

jobsdb

 

technology solution

No comments:

Post a Comment

NO LINK!!!!!!!!