Maltego- Information Gathering Tool Tutorial

This article is link with our series article on footprinting (Information gathering) for previous story click here.
Now beside whois,Nslookup and tracert command there are some tools that available on market to perform footprinting professionally, these tools provide a wide range of option and techniques to perform a valuable footprinting.  

In this article we will talk about Maltego, Maltego is an open source forensic application that are used to gather maximum information for the purpose of forensic and pen testing, it can represent a result in a very formal and easy to understand format. It is available in two flavours one is community edition and other is commercial version.

You can download Maltego on your windows based operating system and for Linux based operating system. Click here to grab your copy.


 This is the top and main navigation bar, there are two tabs one is investigate and the other is manage tab.

Now we are on the manage tab, where we can see different entities and transforms, but the point of consideration is Palette option turn it on.

Palette option is the main option from you have to drag your main task, for example if you want to gather a information about a person than drag the person option and enter the name of the person to whom you are going to gather information.

After all right click on a person and suppose we have to find the email addresses of a related person, than in the email option click all in the set and your scan will began. Output is depend on your computer processing speed and your internet speed.

Now we have found a related email addresses. Is this enough? No there are more amazing options present on maltego like to your can gather information about DNS server. For this purpose see the video demonstration of maltego.

Video Tutorial

FootPrinting-Information Gathering Tutorial

FootPrinting-First Step Of Ethical Hacking

Dnsmap- DNS Network Mapper

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...