diy:network-recon
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
diy:network-recon [2024/06/08 01:12] – [IP Addresses] Humphrey Boa-Gart | diy:network-recon [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
So you have decided to investigate a web site. This could be for any of a multitude of reasons, all of which are Irrelevant to the purposes of this article. The point is, this hypothetical site and its staff are asking for it, and you are about to give it to them. | So you have decided to investigate a web site. This could be for any of a multitude of reasons, all of which are Irrelevant to the purposes of this article. The point is, this hypothetical site and its staff are asking for it, and you are about to give it to them. | ||
- | Lets say this site is [[http:// | + | Lets say this site is, hypothetically, |
- | ===== IP Addresses ===== | + | ===== Finding |
- | Every machine on the internet has an **IP address**, and every domain name resolves to an IP address. Domain names are only aliases for IP addresses because // | + | Every machine |
- | Also note that several different sites under different domains | + | Also note that several different sites under different domains |
- | ==== Finding | + | There are a handful of basic commands in *nix/ |
- | There are a handful of basic commands in *nix/ | + | ==== ping ==== |
- | === ping === | + | The classic '' |
- | C: | + | $ ping scanme.nmap.org |
- | Pinging www.lulzhost.net [209.62.62.138] with 32 bytes of data: | + | With the IP in the response: |
- | Reply from 209.62.62.138: bytes=32 time=40ms TTL=50 Reply from 209.62.62.138: bytes=32 time=44ms TTL=50 Reply from 209.62.62.138: bytes=32 time=38ms TTL=50 | + | PING scanme.nmap.org (45.33.32.156) 56(84) bytes of data. |
+ | 64 bytes from scanme.nmap.org (45.33.32.156): icmp_seq=1 ttl=52 | ||
+ | 64 bytes from scanme.nmap.org (45.33.32.156): icmp_seq=2 ttl=52 | ||
+ | 64 bytes from scanme.nmap.org (45.33.32.156): icmp_seq=3 ttl=52 | ||
- | === host === | + | What if we send a ping to the root domain? |
- | januszeal@sumomo ~ $ host www.google.com www.google.com is an alias for www.l.google.com. www.l.google.com has address 74.125.47.99 www.l.google.com has address 74.125.47.103 www.l.google.com has address 74.125.47.104 www.l.google.com has address 74.125.47.147 | + | |
+ | PING nmap.org (50.116.1.184) 56(84) bytes of data. | ||
+ | 64 bytes from ack.nmap.org (50.116.1.184): icmp_seq=1 ttl=53 time=84.7 ms | ||
+ | 64 bytes from ack.nmap.org (50.116.1.184): icmp_seq=2 ttl=53 time=90.6 ms | ||
+ | 64 bytes from ack.nmap.org (50.116.1.184): icmp_seq=3 ttl=53 time=86.6 ms | ||
- | === dig === | + | It reveals that Nmap's home page and ScanMe service run on two separate IP addresses! This is incredibly useful knowledge, for anyone conducting hypothetical attacks on Nmap's servers. |
- | chance@AMD64: | + | ==== nslookup ==== |
- | <<>> | + | Another commonly bundled cross-platform command, '' |
- | global options | + | |
- | printcmd | + | |
- | Got answer | + | |
- | ->> | + | |
- | QUERY, status: NOERROR, id: 48731 | + | |
- | flags | + | |
- | qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0 | + | |
- | QUESTION SECTION | + | |
- | www.google.com. IN A | + | |
- | ANSWER SECTION | + | |
- | www.google.com. 42327 IN CNAME www.l.google.com. www.l.google.com. 94 IN A 209.85.225.103 www.l.google.com. 94 IN A 209.85.225.99 www.l.google.com. 94 IN A 209.85.225.147 www.l.google.com. 94 IN A 209.85.225.104 | + | |
- | Query time | + | $ nslookup scanme.nmap.org |
- | 2 msec | + | |
- | SERVER | + | |
- | 10.10.256.1#53(10.10.256.1) | + | Address: 45.33.32.156 |
- | WHEN | + | Name: |
- | Tue Mar 24 22:30:27 2009 | + | |
- | MSG SIZE rcvd | + | |
- | 126 | + | |
- | ===== Web hosting ===== | + | You can also use it to find a hostname associated with a given IP address: |
- | Every site is being hosted on someone' | + | $ nslookup 45.33.32.156 |
+ | 156.32.33.45.in-addr.arpa name = scanme.nmap.org. | ||
- | ==== Finding domain name registrar ==== | + | [[https:// |
- | * go here http:// | + | ==== host ==== |
- | * Enter the domain name | + | |
- | * look for Registrar | + | |
- | === *nix based systems | + | Sorry Windows users, but this one is for *nix systems |
- | On all *nix based systems it's pretty easy to find out any available details about a domain. That's what the command ' | + | $ host scanme.nmap.org |
+ | scanme.nmap.org has address 45.33.32.156 | ||
+ | scanme.nmap.org has IPv6 address 2600: | ||
+ | |||
+ | $ host 45.33.32.156 | ||
+ | 156.32.33.45.in-addr.arpa domain name pointer scanme.nmap.org. | ||
- | Usage example: | + | Things we already knew. But what if we run '' |
- | $ whois partyvan.info | + | $ host nmap.org |
+ | nmap.org has address 50.116.1.184 | ||
+ | nmap.org has IPv6 address 2600: | ||
+ | nmap.org mail is handled by 1 aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 5 alt1.aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 5 alt2.aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 10 aspmx2.googlemail.com. | ||
+ | nmap.org mail is handled by 10 aspmx3.googlemail.com. | ||
+ | |||
+ | $ host 50.116.1.184 | ||
+ | 184.1.116.50.in-addr.arpa domain name pointer ack.nmap.org. | ||
- | ==== Finding host ==== | + | A treasure trove of information. Turns out the Nmap project is using [[https:// |
- | Once you have an IP address, you can find out who is hosting a site. | + | ==== dig ==== |
- | | + | Another popular |
- | | + | |
- | * look for OrgName | + | $ dig scanme.nmap.org |
- | * ??? | + | |
- | * PROFIT! | + | Which reveals the IP address in the " |
+ | |||
+ | ;; ANSWER SECTION: | ||
+ | scanme.nmap.org. 1943 IN A 45.33.32.156 | ||
+ | |||
+ | You can force '' | ||
+ | |||
+ | $ dig @9.9.9.9 scanme.nmap.org | ||
+ | |||
+ | It can also do reverse DNS lookups: | ||
+ | |||
+ | $ dig -x 45.33.32.156 | ||
+ | ... | ||
+ | ;; QUESTION SECTION: | ||
+ | ; | ||
+ | |||
+ | ;; ANSWER SECTION: | ||
+ | 156.32.33.45.in-addr.arpa. 300 IN PTR scanme.nmap.org. | ||
+ | |||
+ | Read more [[https:// | ||
+ | |||
+ | |||
+ | ===== WHOIS ===== | ||
+ | |||
+ | [[wp> | ||
+ | |||
+ | WHOIS lookups are a great way to find out more information about a web site or IP address. They can clue you in to who the target uses for a host or domain registrar, geographic locations, and sometimes even the real-world names & addresses of the site owners or administrators. WHOIS lookups are a necessary fundamental skill for {{tagpage> | ||
+ | |||
+ | ==== Domain Information ==== | ||
+ | |||
+ | **WHOIS** lookups are extremely easy to do. That's what the '' | ||
+ | |||
+ | '' | ||
+ | |||
+ | $ whois nmap.org | ||
+ | |||
+ | The lengthy results of this command (which we will not paste here) reveal that Nmap does in fact use one of the aforementioned domain privacy services. It also shows that they use [[https:// | ||
+ | |||
+ | ==== More IP Information ==== | ||
+ | |||
+ | '' | ||
+ | |||
+ | | ||
+ | |||
+ | Running '' | ||
+ | |||
+ | ===== Browser Based Tools ===== | ||
+ | |||
+ | If you don't have access to the command line, there are a handful of sites you can use for DNS & WHOIS lookups in your browser: | ||
+ | |||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | |||
+ | ===== More Things You Can Do ===== | ||
+ | |||
+ | Congratulations! You have now done the absolute bare minimum it takes to profile a web site. But what to do with this information? | ||
+ | |||
+ | * You can compile the info you found into [[tactics: | ||
+ | * You can [[arms: | ||
{{tag> | {{tag> |
diy/network-recon.1717809122.txt.gz · Last modified: 2024/08/06 05:54 (external edit)
Find this page online at: https://bestpoint.institute/diy/network-recon
Find this page online at: https://bestpoint.institute/diy/network-recon