Today we are starting a new series called Website hacking. We will discuss everything from the basic, Like How a website is hacked, types of attacks,  first step to hack a website and at the end how to stay safe from these attacks. Because at the end as an ethical hacker you are learning hacking to protect your self and others from being hacked.

Now to hack anything the first is footprinting, I already discussed what is footprinting and types of footprinting. There are soo many ways to obtain information about a particular website and whois lookup is one of them, As I said we will go through the basic.

What is Whois Lookup?

Whois is a query and response protocol used for querying the database for internet resources such as domain name, IP address block, etc. Whois lookup uses TCP 43 protocol listen to the request. Regional Internet Registries (RIRs) maintain the whois database, Which contains the personal information, text record, Domain expiry data, Hosting details, Domain IP, Domain Create Data, Information about the owner, etc
Different Technique TO Perform Whois Lookup.

Whois Domain Lookup is a very famous website help to perform Whois lookup just by entering the IP address or domain name. Whois Domain can give you very important information like Registrar. Hosting details, Location, History, Changes in the domain and name server, etc.

Whois lookup Through Terminal

Kali Linux is a very popular operating system for pentester. To perform Whois lookup open your terminal in your Kali Linux and type the whois following with IP address or domain name like


Nslookup means name server lookup. Nslookup is a command line tool used by the network administrator for querying the DNS (Domain Name Server) to know about IP address and domain mapping or other DNS records. Nslookup is by default available in all the operating system and can be used through cmd or terminal according to your OS. If you want to know about any domain DNS type the “nslookup ” in your terminal or command prompt in windows.

As a hacker, you should try to find more information from different tools and website to find more information about the website, Because as much as information you gather it will help you to hack it.
if you type Whois in google search there are soo many other websites available.

View Comments

  • I'm impressed, I have to admit. Rarely do I encounter a blog that's both equally educative
    and engaging, and let me tell you, you've hit the nail on the head.

    The issue is something that not enough men and women are speaking intelligently about.
    I am very happy that I found this during my search for something concerning this.

  • We are a group of volunteers and opening a new scheme in our community.
    Your site provided us with valuable info to work on. You have done
    an impressive job and our entire community will be grateful to you.

  • Hey exceptional blog! Does running a blog similar to this require
    a massive amount work? I've absolutely no knowledge of
    computer programming however I was hoping to start my own blog soon. Anyways, should you have any
    recommendations or tips for new blog owners please share.
    I understand this is off subject however I just
    needed to ask. Many thanks!

Recent Posts

What is CSRF Attack? Common CSRF Bypass

CSRF Attack or Cross-Site Request Forgery is a web application vulnerability that allows an attacker… Read More

2 years ago

Pentesting SSH

What is SSH Secure Shell or SSH is used to remotely access the server or… Read More

2 years ago

Bug Bounty Methodology – How to Approach a Target

There are many people who are new to Bug Bounty. Most of them are stuck,… Read More

2 years ago

Linux Terminal – Tmux

Tmux is a Linux terminal with more advance and helpful features. It allows you to… Read More

2 years ago

Web Application Penetration Testing – Part 3

Till now we know how to connect with the application and find some useful information… Read More

2 years ago

Web Application Penetration Testing – Part 2

So till now in Web application Testing, we have looked footprinting step. Now we will… Read More

2 years ago

This website uses cookies.