CIP Cyber

Maltego Information Gathering Backtrack 5

Table of Contents

Information gathering or foot-printing is generally a first step of Ethical hacking/penetration testing process. The more information you have the more chance of success, information gathering is the important phase because all of the process of hacking based on information that you have. Backtrack and specially Backtrack 5 contain a list of tools that will help you to gather information as DNSenum for DNS information gathering.


Maltego is an intelligent application that will help you to gather maximum information about people about networks and more, it has a broad features to discuss but the main aim of writing this article is not to discuss the feature of maltego but the aim is to demonstrate maltego on the platform of backtrack5. 

Maltego tutorial has been discussed before on ubuntu with videos click here to learn.
  • For bt5, go to Applications–>Backtrack–>Information Gathering–>Network Analysis–>DNS Analysis–>Maltego
  • The first windows will ask you to register your product. 

    • After registration you will able to use maltego, if you will not register your product than you will not able to use it.
    • On the top there is a two tabs, Investigate and Manage
    • Go on manage tab than open a new page
    • There are a lot of different entities available on the screen but the main option is Palette option that is available on left side, if you will not register the product than you would not recognize it.
    • Now at this point everything is same as discussed on the previous maltego tutorial, follow the tutorial to run and use it.

    FootPrinting-Information Gathering Tutorial

    FootPrinting-First Step Of Ethical Hacking

    Dnsmap- DNS Network Mapper

    Backtrack 5- DNSenum Information Gathering Tool

    Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
    CIP Cyber Staff

    CIP Cyber Staff

    CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

    Most popular

    Industrial Cybersecurity

    Want always be up to date?

    Don't miss the latest news

    By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

    CIP Training & Certifications

    Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

    Related Articles

    What Proxies Are For

    When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand among

    Want always be up to date?

    Don't miss the latest news

    By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

    CIP Training & Certifications

    Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings