How to do passive footprinting? Step-by-step guide
Information Gathering

How to do passive footprinting? Step-by-step guide

How to do passive footprinting?

Today a considerable lot of us are getting pulled in or inquisitive to comprehend what hacking is ?

then again how to do it?

For the most part young person and understudies are including in hacking at a speedier rate than before So they ought to know about it, what really it intended to be a Hacker, what all things,knowledge, devices and so forth you require for hacking

Also Read: The COMPLETE beginners guide to hacking (MUST READ)

The first step to hacking is Footprinting.


So what is Footprinting?

– It is the way toward gathering however much data as could be expected about the objective system for discovering the different approaches to barge in into the objective’s system.

From where to get data about the objective:

Gathering Public Information

Social media,Social media destinations are the new means for organizations communicating on the web. Scrutinizing the accompanying destinations can give untold points of interest on any given business and its kin:

  • Facebook ( 
  • LinkedIn ( 
  • Twitter ( 
  • YouTube (

Web seek Performing a web look or just perusing your association’s site can turn up the accompanying data:

  • Representative names and contact data 
  • Imperative organization dates 
  • Consolidation filings 
  • SEC filings (for open organizations) 
  • Official statements about physical moves, hierarchical changes, and new items 
  • Mergers and acquisitions 
  • Licenses and trademarks 
  • Introductions, articles, webcasts, or online classes

Also Read: How to trace your friend’s IP Address while chatting!

Bing ( and Google ( uncover data

— in everything from word handling records to designs documents

— on any freely open PC. What’s more, they’re free.

— Typing watchwords.

This sort of pursuit frequently uncovers hundreds and here and there a huge number of pages of data —, for example, records, telephone numbers, and addresses — that you never speculated were accessible.

— Performing advanced web searches.

Google’s propelled look alternatives can discover locales that connection back to your organization’s site. This sort of pursuit frequently uncovers a ton of data about accomplices, sellers, customers, and different affiliations.

— Using switches to dig deeper into a website.

For instance, in the event that you need to locate a specific word or record on your site, basically enter a line like one of the accompanying into Google: keyword filename

You can even do a nonexclusive filetype seek over the whole Internet to perceive what turns up, for example, this:

filetype:swf company_name

Utilize the previous pursuit to discover Flash .swf documents, which can be downloaded and decompiled to uncover touchy data that can be utilized against your business.

Utilize the accompanying quest to chase for PDF records that may contain touchy data that can be utilized against your business:

filetype:pdf company_name secret

Web crawling

Web‐crawling utilities, for example, HTTrack Website Copier (, can reflect your site by downloading each publicly‐accessible document from it, like how a web defenselessness scanner slithers the site it’s trying. You would then be able to assess that duplicate of the site disconnected, diving into the accompanying:

  • The site design and arrangement 
  • Catalogs and documents that may not generally be evident or promptly open 
  • The HTML and script source code of website pages 
  • Remark fields Comment fields regularly contain valuable data, for example, names and e‐mail locations of the designers and inside IT faculty, server names, programming forms, interior IP tending to plans, and general remarks about how the code functions. On the off chance that you’re intrigued, you can keep a few sorts of web slithering by making Disallow passages in your web server’s robots.txt document as sketched out at

You can even empower web tar-setting in specific firewalls and interruption anticipation frameworks (IPSs). In any case, crawlers (and aggressors) that are sufficiently keen can discover courses around these controls.

Also Read: Google Hacking Guide


The accompanying sites may give particular data around an association and its representatives:

Government and business websites:

•  and  give point by point data about open organizations.

•  demonstrates SEC filings of open organizations.

•  offers patent and trademark enrollments.

• The site for your state’s Secretary of State or comparative association can offer joining and corporate officer data.

Background checks and other personal information, from websites  such as: 

• (

•  ZabaSearch (

There’s a similar article on passive information gathering sources too! Check it out!

Passive Information Gathering sources

I hope this article passive footprinting helps you!

Thanks for reading!

Happy Hacking…!!!

The following two tabs change content below.

Anuj Mishra

Admin, Founder & Chief Editor at HackeRoyale
Engineer. Blogger. Ethical hacker. Penetration Tester. Deep Webbie. Bug hunter. Security Analyst. Web Developer. Techie. Programmer. Foodie. Music Lover. Traveller. Enthusiast.


  1. My developer is trying to persuade me tto move to .net from PHP.

    I have always disliked the idcea because of the costs.
    But he’s tryiong none the less. I’ve been using Movable-type
    onn various websites for about a year and
    am anxious about switching to another platform.
    I hhave heard fantastic things about
    Is there a way I can import all my wordpress posts into it?
    Any kind of help would bee really appreciated!

Comment Now !