BigCommerce Facebook Store
Do You Want To Get Paid For Writing Reviews & Posts? [SIGN UP] On These Websites & Make Money Online!

How A Hacker Can Actually Reach Your Place

CONNECT WITH HBB ON SOCIAL MEDIA

An information from scratch can be used to gather certain information that can be really astonishing. Here in this post I will show you how a person can reach your place if  he/she has your IP address or domain name. Here I will demonstrate using a spam email which deliberately flooded my inbox  from a particular sender and show you how we can reach his house. So lets start….

Disclaimer: This post is actually to aware people about there online privacy rather misuse this trick.

Information Gathering :

  • From the email I got the “Domain Name” and name of the person and used it do the whois. As you all can see I got the address, phone no, fax etc from the image below. You can also use the IP address from the email header to obtain the information.

Whois of the domain name

  • Then I opened Google Maps to find the street view of the above obtained address. As you all can see I reached the street of the person and the desired place is approximately near to it.

Google map image

  • I will show you what more info I got, I used his name,city and country to find info about his family from here as shown below.

  • Then using his name and location in Google search I found his MySpace account as shown below and got to see his face.

Google search result

Countermeasures:

#1 – One should always use “Tor” like anonymous tools while browsing and especially using email accounts.

#2 – Keep the information of your Domain name set to private.

#3 – Keep the information on your Social Networking sites set to private.

#4 – Take care while sharing your Phone no or Fax no with any stranger or unknown website.

This guest article is written by Satyajit Das, Author and Owner of SecurityHunk. He is a 23 years old ethical hacking enthusiast and a part time blogger. If you wish to write for us, kindly check this.


By

A 23years old ethical hacking enthusiast and a part time blogger who blogs at SecurityHunk.I completed my Graduation in Electronics and Communication in 2010 and really passionate about "Hacking" and "Computer Security" related stuffs. Now I am continuing my extended reading and research on "Malware analysis".

Want to discuss your queries and interact with experts? You can connect with HellBound Bloggers (HBB) Facebook group for free!

Join HellBound Bloggers (HBB) and get Instant Updates. We'll also notify you with Great Deals, Discounts and other Interesting Tips. We won't SPAM or SHARE your Email Address with anyone.

Earn up to $7500 for one sale!

Thank you for reading! We welcome and appreciate your comments, but at the same time, make sure you are adding something valuable to this article. If you have any serious queries, suggestions or anything related to this article, feel free to share them, we really appreciate that.

But, if your blog comments are a random "Thank you", "Useful Post", or anything that doesn't actually upscale the article, then we'll be removing them and it won't be appeared below. Thanks for understanding and thanks for connecting with us. If you want to give us any feedback or report any errors, you can kindly contact us and we'll revert back soon.

  • Comments
  • Facebook Comments
More in Security
7 Simple Tips To Enhance Your WordPress Blog Security

Close