Welcome to HackeRoyale.

How to do passive footprinting? Step-by-step guide

How to do passive footprinting? Step-by-step guide

How to do passive footprinting?

Today a considerable lot of us are getting pulled in or inquisitive to comprehend what hacking is ?

then again how to do it?

For the most part young person and understudies are including in hacking at a speedier rate than before So they ought to know about it, what really it intended to be a Hacker, what all things,knowledge, devices and so forth you require for hacking

Also Read: The COMPLETE beginners guide to hacking (MUST READ)

The first step to hacking is Footprinting.


So what is Footprinting?

– It is the way toward gathering however much data as could be expected about the objective system for discovering the different approaches to barge in into the objective’s system.

From where to get data about the objective:

Gathering Public Information

Social media,Social media destinations are the new means for organizations communicating on the web. Scrutinizing the accompanying destinations can give untold points of interest on any given business and its kin:

  • Facebook (www.facebook.com)
  • LinkedIn (www.linkedin.com)
  • Twitter (https://twitter.com)
  • YouTube (www.youtube.com)

Web seek Performing a web look or just perusing your association’s site can turn up the accompanying data:

  • Representative names and contact data
  • Imperative organization dates
  • Consolidation filings
  • SEC filings (for open organizations)
  • Official statements about physical moves, hierarchical changes, and new items
  • Mergers and acquisitions
  • Licenses and trademarks
  • Introductions, articles, webcasts, or online classes

Bing (www.bing.com) and Google (www.google.com) uncover data

— in everything from word handling records to designs documents

— on any freely open PC. What’s more, they’re free.

— Typing watchwords.

This sort of pursuit frequently uncovers hundreds and here and there a huge number of pages of data —, for example, records, telephone numbers, and addresses — that you never speculated were accessible.

— Performing advanced web searches.

Google’s propelled look alternatives can discover locales that connection back to your organization’s site. This sort of pursuit frequently uncovers a ton of data about accomplices, sellers, customers, and different affiliations.

— Using switches to dig deeper into a website.

For instance, in the event that you need to locate a specific word or record on your site, basically enter a line like one of the accompanying into Google:

site:www.your_domain.com keyword

 site:www.your_domain.com filename

You can even do a nonexclusive filetype seek over the whole Internet to perceive what turns up, for example, this:

filetype:swf company_name

Utilize the previous pursuit to discover Flash .swf documents, which can be downloaded and decompiled to uncover touchy data that can be utilized against your business.

Utilize the accompanying quest to chase for PDF records that may contain touchy data that can be utilized against your business:

filetype:pdf company_name secret

Web crawling

Web‐crawling utilities, for example, HTTrack Website Copier (www.httrack.com), can reflect your site by downloading each publicly‐accessible document from it, like how a web defenselessness scanner slithers the site it’s trying. You would then be able to assess that duplicate of the site disconnected, diving into the accompanying:

  • The site design and arrangement
  • Catalogs and documents that may not generally be evident or promptly open
  • The HTML and script source code of website pages
  • Remark fields Comment fields regularly contain valuable data, for example, names and e‐mail locations of the designers and inside IT faculty, server names, programming forms, interior IP tending to plans, and general remarks about how the code functions. On the off chance that you’re intrigued, you can keep a few sorts of web slithering by making Disallow passages in your web server’s robots.txt document.

You can even empower web tar-setting in specific firewalls and interruption anticipation frameworks (IPSs). In any case, crawlers (and aggressors) that are sufficiently keen can discover courses around these controls.

Also Read: Google Hacking Guide


The accompanying sites may give particular data around an association and its representatives:

Government and business websites:

•  www.hoovers.com  and  http://finance.yahoo.com  give point by point data about open organizations.

•  www.sec.gov/edgar.shtml  demonstrates SEC filings of open organizations.

•  www.uspto.gov  offers patent and trademark enrollments.

• The site for your state’s Secretary of State or comparative association can offer joining and corporate officer data.

Background checks and other personal information, from websites  such as: 

•  LexisNexis.com (www.lexisnexis.com)

•  ZabaSearch (www.zabasearch.com)

There’s a similar article on passive information gathering sources too! Check it out!

Passive Information Gathering sources

I hope this article passive footprinting helps you!

Thanks for reading!

Happy Hacking…!!!


featured posts


Get weekly updates by subscribing to our newsletter.