fbpx

Maltego Information Gathering Backtrack 5

Information gathering or foot-printing is generally a first step of Ethical hacking/penetration testing process. The more information you have the more chance of success, information gathering is the important phase because all of the process of hacking based on information that you have. Backtrack and specially Backtrack 5 contain a list of tools that will help you to gather information as DNSenum for DNS information gathering.


Maltego is an intelligent application that will help you to gather maximum information about people about networks and more, it has a broad features to discuss but the main aim of writing this article is not to discuss the feature of maltego but the aim is to demonstrate maltego on the platform of backtrack5. 

Maltego tutorial has been discussed before on ubuntu with videos click here to learn.
  • For bt5, go to Applications–>Backtrack–>Information Gathering–>Network Analysis–>DNS Analysis–>Maltego
  • The first windows will ask you to register your product. 

    • After registration you will able to use maltego, if you will not register your product than you will not able to use it.
    • On the top there is a two tabs, Investigate and Manage
    • Go on manage tab than open a new page
    • There are a lot of different entities available on the screen but the main option is Palette option that is available on left side, if you will not register the product than you would not recognize it.
    • Now at this point everything is same as discussed on the previous maltego tutorial, follow the tutorial to run and use it.

    FootPrinting-Information Gathering Tutorial

    FootPrinting-First Step Of Ethical Hacking

    Dnsmap- DNS Network Mapper

    Backtrack 5- DNSenum Information Gathering Tool

    Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
    Ehacking Staff
    With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

    Most Popular

    What Makes ICS/OT Infrastructure Vulnerable?

    Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

    Everything You Must Know About IT/OT Convergence

    What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

    Understand the OT Security and Its Importance

    This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

    What is Deepfake, and how does it Affect Cybersecurity?

    Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...