Information Gathering on Android using Hackode

Welcome friends, now lets dig more into the footprinting basics with an awesome app, that can help you for an in-depth analysis. I'm talking about Hackode. Yeah, lets check then!



As I said in my previous two tutorials, it applies the same here. You need to have a rooted Android device with BusyBox binaries installed. With that, lets move on!

Download the Hackode & install it.


Grant the root permissions & move on.

You will be greeted by the following screen.


Select the Reconnaissance section.


Well, this short description will help you with this term, if you don't really know what does reconnaissance mean in practical!

Go for "Browse Tools".


Here, let me tell you guys. There are some tools in Google hacking part. But I've realized that most of them don't work properly. Even if they work, the results are quite often not accurate. Its because this app redirects to another site for searching results.

I like the Whois lookup part of this app. So, lets explore it...


It will ask to enter IP or domain. So, enter the desired one which you want to perform whois lookup for.

It will redirect you to another site to give you the whois lookup results.




That's easy right! Now, lets move on to the best part...

Come back to the first page of the app & select the "Scanning" option.



Here, you will see options for Ping, Traceroute, MX records and DNS Dig.

Many of us know about the ping  command. It allows you to test the reachability of a host and to measure the round trip time for messages sent from the originating host to a destination device.

So, we go for the traceroute option.
It allows you to identify the intermediate devices and the connection speed.


Enter the host to traceroute for. I've got the following results for this tool:


Now, we can search for MX records too. MX records are the information about the target's mail server responsible for accepting email messages on behalf of a recipient's domain.


Badly, as Blogger is owned by Google, it refuses to provide the sufficient details! :( Well, actually its good safety measure for us indeed! ;)


Now, moving on to the Dig section.


DIG (Domain Information Groper) is used to find information about the target website's DNS server.
Here, I've the DIG report for google.com at that moment.


I strongly recommend you all to try this lovely app! I hope you liked reading this tutorial. Looking forward for your incredible thoughts & opinions. Check out my next tutorial on IP Tools App! Bye...

Share this

Related Posts