Footprinting through the search engine is unambiguous in itself. People often wonder what one can find through the search engine as the common concept of the search engine is basic exploring. But results given by the search engine can be used to hacker’s advantage as they are vast in nature.
Even search engine cache and internet archives may provide sensitive information that has been removed from the World Wide Web (WWW).
There are many search engines where you can find anything that desires from finding the meaning of the word to finding a person. Such search engines are:
Attackers use search engines to such as technology platforms, employee details, login pages, intranet portals, etc. which helps in performing social engineering and other types of advanced system attacks.
and may also provide sensitive information that has been removed from the World Wide Web (WWW).
Finding Company’s Public Restricted and Websites
Check for the external URL of the target organization using a search engine like Google, Bing, etc. Restricted URLs offer a glimpse inside the many divisions and business units within a firm.You may find a company’s restricted URLs http://www.netcraft.com
Use the tool to in use by the target organization.
Use SHODAN search engine that lets you (routers, servers, etc.) using a variety of filters.
Use tool to get the physical location of the target.
The best place to find information about people and organizations is on social networking platforms.Information about an individual can be found at various .
The people search returns the following :
Gather Information from
Financial services provides a useful information about the target company such as the , etc.
You can gather job postings.
Monitorming Target Using
Alerts are content monitoring systems that send you automated emails or SMS messages with the most recent information based on your choices.Examples of Alert Services:
Information Gathering Using, and
Groups, forums, and blogs provide sensitive information about a target such as , etc.
Register with fake profiles in , etc. and try to join the target organization’s employee groups where they share personal and company information.
Search for information by Fully Qualified Domain Name (), , and in groups, forums, and blogs.