Skip to main content

MALTEGO-INFORMATION GATHERING GRAPH




Hello Friend,
                Welcome back to Hacker_heaven .in this article i am gonna show you how to gather deep information about any specific website.so just stick with me...



Maltego is a Reconnaissance tool built into Kali developed by Paterva. It is a multipurpose Reconnaissance tool that can gather information using open and public information on the Internet. It has some built-in DNS Reconnaissance, but goes much deeper into fingerprinting your target and gathering intelligence on
them. It takes the information and displays the results in a graph for analysis. To start Maltego, navigate to Application menu in Kali, and click on the Kali menuThen select Information Gathering | DNS Analysis | Maltego.
The first step when you launch Maltego is to register it. You cannot use the application without registration.

here is the video show you how to resigster in maltigo.



When you complete registration, you will be able to install Maltego and start using

the application.


Maltego has numerous methods of gathering information. The best way to use Maltego is to take advantage of the startup wizard to select the type of information you want to gather. Experienced users may want to start with a blank graph or skip the wizard all together. The power of Maltego is that it lets you visually observe the
relationship between a domain, organization, and people. You can focus around a specific organization, or look at an organization and its related partnerships from DNS queries.
Depending on the scan options chosen, Maltego will let you perform the following tasks:
Associate an e-mail address to a person
Associate websites to a person
Verify an e-mail address
Gather details from Twitter, including geolocation of pictures



Most of the features are self-explanatory and include how they are used under the feature description. Maltego is used commonly to gather information and sometimes used as the first step during a social engineering attack.
it have numerous feature to dig deep in specific target.
so for easier to viewer i just make an video how to use the maltego to gather all the information.

Please like ,share comments ...until next article this is 
                             ZEROCOOL
                             SIGN OUT


Popular posts from this blog

DEEP SOUND -STEGNOGRAPHY

In the series of the steganography ..today we are going to discuss the hiding of data in the music file through the help of the window based tool name       "DEEP SOUND" ..now a days very famous TV series name             Mr. Robot . . off course i am  fan of this show..where elliot use this tool for hiding his secret data.. read previous article on steganography                                                         so without wasting much time lets start .. 1.install the DEEP SOUND go to the official website of the deep sound and download it to your machine.  and open up the interface of the deep sound. 2. setting click on the setting gear icon, an pop-up window show up...where languge remain same as english,           change your output  directory ..like i change it to the documents by browsing the folder. after that check the box for encrypt files .. after that it will ask for the password.. input your password for the sec

KALI LINUX -SECURITY ,CONFIGURATIO AND UPDATES

      Configuring network services and  secure  communications The first step in being able to use Kali is to ensure that it has connectivity to either a wired or wireless network to support updates and customization. You may need to obtain an IP address by DHCP (Dynamic Host Configuration Protocol), or assign one statically. First, confirm your IP address using the  command  ifconfig command from a terminal window, as shown in the following screenshot: IP address is 192.168.1.11.... If an IP address was not obtained, an address can be assigned by DHCP using the command dhclient eth0 (or other available interfaces, which will depend on the  specific configuration of the system being used). If a static IP address is used, additional information may be required. For example, you can assign a static IP of 192.168.1.11as follows:                     inet addr:192.168.1.11            Bcast:192.168.1.255            Mask:255.255.255.0        Securing com

EVERY LINUX_ADMIN-COMMANDS TO BE KNOW

Hello Friends,             in todays article i am gonna cover the most used 16 linux commands,every linux admin should know it.in the whole article i just show the uses of all the commands and their additional attributes too.