What is FOOTPRINTING in Hindi?

Apne kabhi na kabhi What is Footprinting jarur search kiya hoga. Agar apko Ethical Hacking sikhni hai tab sabse pahla step FOOTPRINTING hota hai. Chaliye iske bare mai detail mai jante hai. FOOTPRINTING ka matlab hota hai. Aap apne target ke bare mai jo bhi information collect karte hai veh FOOTPRINTING hota hai.

Ek Ethical hacker ka adha kaam FOOTPRINTING mai hi ho jata hai. Agar veh apne target ke bare mai sari information ko sahi tarike se collect kar leta hai. Jaise maan lijiye apka target kisi tarah ki koi website hai. Tab aap us website ke Hosted Server, IP Address , Owner information ko collect karte hai tab yeh Footprinting kehlata hai.

Types of FOOTPRINTING

1.Active FOOTPRINTING

Agar aap kisi target website ki Information Gather karna chahte hai. Tab aap website se thoda bahut connect hokar jab Targeted Website ki Information Gather karte hai. Jaise Website Mirroring, Email Tracing, Server tab yeh Active footprinting hogi.

2.Passive FOOTPRINTING

Isme hacker apne TARGET ki najar mai aye bina apne TARGET ki INFORMATION ko gather karta hai. Jaise Google ke through, WHOIS Lookup ke through, DNS Lookup ke through, ek hacker Google ke through: collon ka use karke INFORMATION GATHER krta hai. Google ke through kisi Website ki INFORMATION ko collect karna hota hai. Tab apko Web Programming ki or database servers ki achi knowledge honi chahiye.

Also Read

Methods of Facebook Hacking ?

SYSTEM HACKING?

Methods of Whatsapp Hacking?

Social Engineering  ?

How to use FOOTPRINTING vai Google ?

Ek hacker apni TARGETED WEBSITE ya TARGETED web server ki FOOTPRINTING Google Hacking database se hi starting hoti hai. Jise hum GHDB ke naam se bhi jante hai. GHDB mai pahle se hi dusre hackers ke through find ki gayi vulnerabilities ya Loopholes ko find karke vaha rakha jata hai.

Kuch Hackers inka galt use bhi karte hai lekin aap aisa kabhi mat keren. Hackers ke through vulnerabilities ko find karke GHDB mai isliye rakha jata hai. Taki WEBSITE Owner ko yeh pata chal paye ki kya kami hai. Lekin kuch hackers iska miss use karte hai inhe Dorks bhi kaha jata hai.

Google Searching For FOOTPRINTING 

Intitle

intext

inurl

Filetype

Link

allintitle: Free Learning(intitle:1 + intitle:2)

allintext : Free Learning(intext:1 + intext:2)

Site: Freelearningtech.com

Hackers inhi Strings ka use karke Google mai apni TARGETED WEBSITE ka data nikalte hai. Lekin aap aisa tabhi kare agar apke pass website owner ki taraf se Website penetration ki permission hai. Tab aap in Strings ka use na karke Google hack tool ka bhi use kar sakte hai.

Agar apko kisi person ke bare mai jana hota hai ya unke Social accounts ke bare mai jana hota hai. Ya agar apke pass ek social account hai or baki ke social accounts ke bare mai jana chahte hai. Tab yeh bhi aap kar sakte hai.

Agar apke pass kisi ka ek Social account hai ro baki Social accounts ke bare mai jana chahte hai. Jaise apke pass kisi ki facebook profile hai. Lekin aap uske instagram account ko bhi jana chahte hai.

Aise mai aap Userrecon tool ke through aisa kar sakte hai. Yeh command based tool hai Linux mai aap ise use kar sakte hai. Hackers apne target ke social accounts, Date of birth , Email accounts ki information inhi ke through nikalte hai.

Tools 

Meltago

Userrecon

Spokeo

Anywho

WEBSITE FOOTPRINTING

Agar ek hacker ka target koi website hoti hai. Tab aise mai veh WEBSITE FOOTPRINTING  karte hai. Jaise maan lijiye kisi hacker ki koi target website hai www.example.com tab veh website.informer.com ke through Targeted WEBSITE ka IP Address , Owner name, DNS Server, WEBSITE Owner email address, WEBSITE expiry date jaisi information ko collect karta hai.

FOOTPRINTING

Email Tracing

Email Tracing ko isme isliye rakha gaya hai. Kyoki apne kabhi na kabhi jarur dekha hoga jab kisi tarah ak fake mail apke pass ata hai. Tab apko confirm karna hota hai ki veh fake mail hai ya Orignal hai. Aise mai aap tracing ka use karke iska pata laga sakte hai. Email Tracing karne ke liye Email header ki jarurt hoti hai. Email Header veh hota hai jaha apke pass aye hue mail ki sari information hoti hai. Jaise IP address , email sender name yeh aap Email Tracker Pro tool ki help se kar sakte hai.

WEBSITE Copier

Ek hacker kabhi apne TARGETED WEBSITE ki INFORMATION ko collect WEBSITE ko Online dekh kar nahi karte hai. WEBSITE ko Offline Download karke TARGETED WEBSITE ki INFORMATION ko collect kiya jata hai.

Agar hacker apne TARGETED WEBSITE ko offline download karke usme vulnerability ko find karte hai. Tab usme kisi tarah ks koi risk nahi hota hai. Vaise websites ki kuch files ko download ka access nahi diya gaya hota hai. Lekin phir bhi hacker website ki kafi INFORMATION ko collect kar lete hai.

FOOTPRINTING

Ping or Tracert

Yeh dono command ka use bhi kiya jata hai. Ping ka use kisi WEBSITE ya Server se connectivity ko check karne ke liye kiya jata hai. Iska use hackers yeh dekhne ke liye karte hai ki veh WEBSITE ya server se connectivity bana sakte hai. 

Freelearningtech.in

Tracert command ka use path ko trace karne ke liye kiya jata hai. Jaise CMD mai agar aap Tracert www.google.com likhte hai. Tab apke pass bahut sare IP address show hote hai iska matlab hota hai ki Google se Connection apke computer ka kis kis IP address se hokar ban raha hai in sabhi IP address ko jo apko show hote hai inhe hoops kaha jata hai.

FOOTPRINTING

The Conclusion

Main umeed karta hu ki apko FOOTPRINTING  ke bare mai pata chal gaya hoga. Agar apka kisi bhi tarah ka koi question hai. Tab aap mujhse puch sakte hai yeh sirf yahi tak nahi hota hai yeh sab kuch example hai. Yeh aap par depend karta hai ki aap kaise apne TARGET ke bare mai information collect karte hai.

Jaise maan lijiye ek hacker ka target koi aisa person hai. Jise veh janta tak nahi hai or na hi active or passive FOOTPRINTING ka use kar sakta hai. Lekin hacker ko targeted ka computer access chahiye aise mai veh kya karege yeh ek hacker par depend karta hai.

Chaliye ise example ke through samjhte hai. Tab veh ek pen drive mai virus dal kar apne TARGET ke raste mai kahi aisi jagah rakh dega. Jaha uske TARGET ki najar padegi or jadatar hum yahi karte hai. Agr koi Pen drive jaisi chij hume milti hai tab use utha lete hai.

Veh TARGET bhi aisa hi karega or jab veh Pen Drive ko Computer mai lgayga tab Virus automatic run ho jaygaa. Is tarah hacker ke pass apne TARGET ke computer ka access mil jayga. Yeh bhi ek tarah ki FOOTPRINTING hi hai . Yeh hacker par depend karta hai ki veh apni Skills or mind ka use kaise karta hai.

Thankyou

Leave a Reply

Your email address will not be published. Required fields are marked *

Translate »