diy:network-recon
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
diy:network-recon [2024/06/07 10:01] – created Humphrey Boa-Gart | diy:network-recon [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{wst> | ||
- | |||
====== Network Recon 101 ====== | ====== Network Recon 101 ====== | ||
- | ===== IP addresses ===== | + | So you have decided to investigate a web site. This could be for any of a multitude of reasons, all of which are Irrelevant to the purposes of this article. The point is, this hypothetical site and its staff are asking for it, and you are about to give it to them. |
+ | |||
+ | Lets say this site is, hypothetically, | ||
+ | |||
+ | ===== Finding IP Addresses & DNS Info ===== | ||
+ | |||
+ | Every machine (or **host**) on the internet has an **IP address**, and every domain name resolves to an IP address. Domain names are only aliases for IP addresses | ||
+ | |||
+ | Also note that several different sites under different domains **can share an IP**. Furthermore, | ||
+ | |||
+ | There are a handful of basic commands in *nix/ | ||
+ | |||
+ | ==== ping ==== | ||
+ | |||
+ | The classic '' | ||
+ | |||
+ | $ ping scanme.nmap.org | ||
+ | |||
+ | With the IP in the response: | ||
+ | |||
+ | PING scanme.nmap.org (45.33.32.156) 56(84) bytes of data. | ||
+ | 64 bytes from scanme.nmap.org (45.33.32.156): | ||
+ | 64 bytes from scanme.nmap.org (45.33.32.156): | ||
+ | 64 bytes from scanme.nmap.org (45.33.32.156): | ||
+ | |||
+ | What if we send a ping to the root domain? | ||
+ | |||
+ | $ ping nmap.org | ||
+ | PING nmap.org (50.116.1.184) 56(84) bytes of data. | ||
+ | 64 bytes from ack.nmap.org (50.116.1.184): | ||
+ | 64 bytes from ack.nmap.org (50.116.1.184): | ||
+ | 64 bytes from ack.nmap.org (50.116.1.184): | ||
+ | |||
+ | It reveals that Nmap's home page and ScanMe service run on two separate IP addresses! This is incredibly useful knowledge, for anyone conducting hypothetical attacks on Nmap's servers. | ||
+ | |||
+ | ==== nslookup ==== | ||
+ | |||
+ | Another commonly bundled cross-platform command, '' | ||
+ | |||
+ | $ nslookup scanme.nmap.org | ||
+ | Non-authoritative answer: | ||
+ | Name: | ||
+ | Address: 45.33.32.156 | ||
+ | Name: | ||
+ | Address: 2600: | ||
+ | |||
+ | You can also use it to find a hostname associated with a given IP address: | ||
+ | |||
+ | $ nslookup 45.33.32.156 | ||
+ | 156.32.33.45.in-addr.arpa name = scanme.nmap.org. | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | ==== host ==== | ||
+ | |||
+ | Sorry Windows users, but this one is for *nix systems (Unix, Linux, BSD, MacOS). The '' | ||
+ | |||
+ | $ host scanme.nmap.org | ||
+ | scanme.nmap.org has address 45.33.32.156 | ||
+ | scanme.nmap.org has IPv6 address 2600: | ||
+ | |||
+ | $ host 45.33.32.156 | ||
+ | 156.32.33.45.in-addr.arpa domain name pointer scanme.nmap.org. | ||
+ | |||
+ | Things we already knew. But what if we run '' | ||
+ | |||
+ | $ host nmap.org | ||
+ | nmap.org has address 50.116.1.184 | ||
+ | nmap.org has IPv6 address 2600: | ||
+ | nmap.org mail is handled by 1 aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 5 alt1.aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 5 alt2.aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 10 aspmx2.googlemail.com. | ||
+ | nmap.org mail is handled by 10 aspmx3.googlemail.com. | ||
+ | |||
+ | $ host 50.116.1.184 | ||
+ | 184.1.116.50.in-addr.arpa domain name pointer ack.nmap.org. | ||
+ | |||
+ | A treasure trove of information. Turns out the Nmap project is using [[https:// | ||
+ | |||
+ | ==== dig ==== | ||
+ | |||
+ | Another popular *nix utility is the '' | ||
+ | |||
+ | $ dig scanme.nmap.org | ||
- | Every machine on the internet has an ip address. Far too often users in IRC ask " | + | Which reveals |
- | ==== Finding IPs ==== | + | ;; ANSWER SECTION: |
+ | scanme.nmap.org. 1943 IN A 45.33.32.156 | ||
- | The [[https://addons.mozilla.org/ | + | You can force '' |
- | | + | |
- | januszeal@sumomo ~ $ host www.google.com www.google.com is an alias for www.l.google.com. www.l.google.com has address 74.125.47.99 www.l.google.com has address 74.125.47.103 www.l.google.com has address 74.125.47.104 www.l.google.com has address 74.125.47.147 | + | It can also do reverse DNS lookups: |
- | or | + | $ dig -x 45.33.32.156 |
+ | ... | ||
+ | ;; QUESTION SECTION: | ||
+ | ; | ||
+ | |||
+ | ;; ANSWER SECTION: | ||
+ | 156.32.33.45.in-addr.arpa. 300 IN PTR scanme.nmap.org. | ||
+ | Read more [[https:// | ||
- | chance@AMD64: | ||
- | <<>> | + | ===== WHOIS ===== |
- | global options | + | |
- | printcmd | + | |
- | Got answer | + | |
- | ->> | + | |
- | QUERY, status: NOERROR, id: 48731 | + | |
- | flags | + | |
- | qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0 | + | |
- | QUESTION SECTION | + | |
- | www.google.com. IN A | + | |
- | ANSWER SECTION | + | |
- | www.google.com. 42327 IN CNAME www.l.google.com. www.l.google.com. 94 IN A 209.85.225.103 www.l.google.com. 94 IN A 209.85.225.99 www.l.google.com. 94 IN A 209.85.225.147 www.l.google.com. 94 IN A 209.85.225.104 | + | |
- | Query time | + | [[wp> |
- | 2 msec | + | |
- | SERVER | + | |
- | 10.10.256.1# | + | |
- | WHEN | + | |
- | Tue Mar 24 22:30:27 2009 | + | |
- | MSG SIZE rcvd | + | |
- | 126 | + | |
- | * Windows | + | |
- | C: | + | |
- | Pinging www.lulzhost.net [209.62.62.138] with 32 bytes of data: | + | WHOIS lookups are a great way to find out more information about a web site or IP address. They can clue you in to who the target uses for a host or domain registrar, geographic locations, and sometimes even the real-world names & addresses of the site owners or administrators. WHOIS lookups are a necessary fundamental skill for {{tagpage> |
- | Reply from 209.62.62.138: | + | ==== Domain Information |
- | PINGING A HOST WILL NOT CAUSE ANY KIND OF HARM TO IT, STOP TRYING TO TAKE DOWN SITES BY PINGING THEM YOU FUCKING RETARDS. | + | **WHOIS** lookups are extremely easy to do. That's what the '' |
- | Hmm... The FireFox extension FoxyFlag may be interesting. It supposedly gives you a site's IP, although when I did on google | + | '' |
- | * That is correct, however I find Domain Details to be a better add-on janus zealtalkwat 01:54, 8 July 2008 (UTC) | + | $ whois nmap.org |
- | ===== Web hosting ===== | + | The lengthy results of this command (which we will not paste here) reveal that Nmap does in fact use one of the aforementioned domain privacy services. It also shows that they use [[https:// |
- | Every site is being hosted on someone' | + | ==== More IP Information ==== |
- | ==== Finding domain name registrar ==== | + | '' |
- | | + | |
- | * Enter the domain name | + | |
- | * look for Registrar | + | |
- | === *nix based systems === | + | Running '' |
- | On all *nix based systems it's pretty easy to find out any available details about a domain. That's what the command ' | + | ===== Browser Based Tools ===== |
- | Usage example: | + | If you don't have access to the command line, there are a handful of sites you can use for DNS & WHOIS lookups in your browser: |
- | | + | |
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
- | ==== Finding host ==== | + | ===== More Things You Can Do ===== |
- | Once you have an IP address, you can find out who is hosting | + | Congratulations! You have now done the absolute bare minimum it takes to profile |
- | * go here [[https:// | + | * You can compile the info you found into [[tactics:dox|a dox file]] for the target. |
- | * enter IP address | + | * You can [[arms: |
- | * look for OrgName | + | |
- | * ??? | + | |
- | * PROFIT! | + | |
{{tag> | {{tag> |
diy/network-recon.1717754490.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/diy/network-recon
Find this page online at: https://bestpoint.institute/diy/network-recon