Maltego Information Gathering Backtrack 5

Information gathering or foot-printing is generally a first step of Ethical hacking/penetration testing process. The more information you have the more chance of success, information gathering is the important phase because all of the process of hacking based on information that you have. Backtrack and specially Backtrack 5 contain a list of tools that will help you to gather information as DNSenum for DNS information gathering.


Maltego is an intelligent application that will help you to gather maximum information about people about networks and more, it has a broad features to discuss but the main aim of writing this article is not to discuss the feature of maltego but the aim is to demonstrate maltego on the platform of backtrack5. 

Maltego tutorial has been discussed before on ubuntu with videos click here to learn.
  • For bt5, go to Applications–>Backtrack–>Information Gathering–>Network Analysis–>DNS Analysis–>Maltego
  • The first windows will ask you to register your product. 

    • After registration you will able to use maltego, if you will not register your product than you will not able to use it.
    • On the top there is a two tabs, Investigate and Manage
    • Go on manage tab than open a new page
    • There are a lot of different entities available on the screen but the main option is Palette option that is available on left side, if you will not register the product than you would not recognize it.
    • Now at this point everything is same as discussed on the previous maltego tutorial, follow the tutorial to run and use it.

    FootPrinting-Information Gathering Tutorial

    FootPrinting-First Step Of Ethical Hacking

    Dnsmap- DNS Network Mapper

    Backtrack 5- DNSenum Information Gathering Tool

    Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
    Ehacking Staff
    With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

    Most Popular

    Top 5 Techniques Hackers Use to hack Social Media Accounts

    These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

    5 Top Programming Languages for Hacking

    We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

    OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

    No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

    Preventing SQL Injection in PHP Applications

    SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...