diy:network-recon
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
diy:network-recon [2024/06/08 03:01] – [ping] Humphrey Boa-Gart | diy:network-recon [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
So you have decided to investigate a web site. This could be for any of a multitude of reasons, all of which are Irrelevant to the purposes of this article. The point is, this hypothetical site and its staff are asking for it, and you are about to give it to them. | So you have decided to investigate a web site. This could be for any of a multitude of reasons, all of which are Irrelevant to the purposes of this article. The point is, this hypothetical site and its staff are asking for it, and you are about to give it to them. | ||
- | Lets say this site is [[http:// | + | Lets say this site is, hypothetically, |
- | ===== Finding IP Addresses & Other Basic Info ===== | + | ===== Finding IP Addresses & DNS Info ===== |
- | Every machine on the internet has an **IP address**, and every domain name resolves to an IP address. Domain names are only aliases for IP addresses because // | + | Every machine |
- | Also note that several different sites under different domains | + | Also note that several different sites under different domains |
There are a handful of basic commands in *nix/ | There are a handful of basic commands in *nix/ | ||
- | ==== ping (Cross-Platform) | + | ==== ping ==== |
- | The classic '' | + | The classic '' |
$ ping scanme.nmap.org | $ ping scanme.nmap.org | ||
Line 38: | Line 38: | ||
==== nslookup ==== | ==== nslookup ==== | ||
- | Another commonly bundled command, '' | + | Another commonly bundled |
$ nslookup scanme.nmap.org | $ nslookup scanme.nmap.org | ||
Line 56: | Line 56: | ||
==== host ==== | ==== host ==== | ||
- | januszeal@sumomo ~ $ host www.google.com www.google.com is an alias for www.l.google.com. www.l.google.com has address | + | Sorry Windows users, but this one is for *nix systems (Unix, Linux, BSD, MacOS). The '' |
+ | |||
+ | | ||
+ | scanme.nmap.org has address 45.33.32.156 | ||
+ | scanme.nmap.org has IPv6 address 2600: | ||
+ | |||
+ | $ host 45.33.32.156 | ||
+ | 156.32.33.45.in-addr.arpa domain name pointer scanme.nmap.org. | ||
+ | |||
+ | Things we already knew. But what if we run '' | ||
+ | |||
+ | $ host nmap.org | ||
+ | nmap.org | ||
+ | nmap.org has IPv6 address 2600: | ||
+ | nmap.org mail is handled by 1 aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 5 alt1.aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 5 alt2.aspmx.l.google.com. | ||
+ | nmap.org mail is handled by 10 aspmx2.googlemail.com. | ||
+ | nmap.org mail is handled by 10 aspmx3.googlemail.com. | ||
+ | |||
+ | $ host 50.116.1.184 | ||
+ | 184.1.116.50.in-addr.arpa domain name pointer ack.nmap.org. | ||
+ | |||
+ | A treasure trove of information. Turns out the Nmap project is using [[https:// | ||
==== dig ==== | ==== dig ==== | ||
- | chance@AMD64:~$ dig www.google.com | + | Another popular *nix utility is the '' |
+ | |||
+ | $ dig scanme.nmap.org | ||
+ | |||
+ | Which reveals the IP address in the " | ||
+ | |||
+ | ;; ANSWER SECTION: | ||
+ | scanme.nmap.org. 1943 IN A 45.33.32.156 | ||
+ | |||
+ | You can force '' | ||
+ | |||
+ | $ dig @9.9.9.9 scanme.nmap.org | ||
+ | |||
+ | It can also do reverse DNS lookups: | ||
+ | |||
+ | | ||
+ | ... | ||
+ | ;; QUESTION SECTION: | ||
+ | ; | ||
+ | |||
+ | ;; ANSWER SECTION: | ||
+ | 156.32.33.45.in-addr.arpa. 300 IN PTR scanme.nmap.org. | ||
+ | |||
+ | Read more [[https:// | ||
+ | |||
+ | |||
+ | ===== WHOIS ===== | ||
+ | |||
+ | [[wp> | ||
+ | |||
+ | WHOIS lookups are a great way to find out more information about a web site or IP address. They can clue you in to who the target uses for a host or domain registrar, geographic locations, and sometimes even the real-world names & addresses of the site owners or administrators. WHOIS lookups are a necessary fundamental skill for {{tagpage> | ||
+ | |||
+ | ==== Domain Information ==== | ||
+ | |||
+ | **WHOIS** lookups are extremely easy to do. That's what the '' | ||
- | <<>> | + | '' |
- | global options | + | |
- | printcmd | + | |
- | Got answer | + | |
- | ->> | + | |
- | QUERY, status: NOERROR, id: 48731 | + | |
- | flags | + | |
- | qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 0 | + | |
- | QUESTION SECTION | + | |
- | www.google.com. IN A | + | |
- | ANSWER SECTION | + | |
- | www.google.com. 42327 IN CNAME www.l.google.com. www.l.google.com. 94 IN A 209.85.225.103 www.l.google.com. 94 IN A 209.85.225.99 www.l.google.com. 94 IN A 209.85.225.147 www.l.google.com. 94 IN A 209.85.225.104 | + | |
- | Query time | + | $ whois nmap.org |
- | 2 msec | + | |
- | SERVER | + | |
- | 10.10.256.1# | + | |
- | WHEN | + | |
- | Tue Mar 24 22:30:27 2009 | + | |
- | MSG SIZE rcvd | + | |
- | 126 | + | |
- | ===== Web hosting ===== | + | The lengthy results of this command (which we will not paste here) reveal that Nmap does in fact use one of the aforementioned domain privacy services. It also shows that they use [[https:// |
- | Every site is being hosted on someone' | + | ==== More IP Information ==== |
- | ==== Finding domain name registrar ==== | + | '' |
- | | + | |
- | * Enter the domain name | + | |
- | * look for Registrar | + | |
- | === *nix based systems === | + | Running '' |
- | On all *nix based systems it's pretty easy to find out any available details about a domain. That's what the command ' | + | ===== Browser Based Tools ===== |
- | Usage example: | + | If you don't have access to the command line, there are a handful of sites you can use for DNS & WHOIS lookups in your browser: |
- | | + | |
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
- | ==== Finding host ==== | + | ===== More Things You Can Do ===== |
- | Once you have an IP address, you can find out who is hosting | + | Congratulations! You have now done the absolute bare minimum it takes to profile |
- | * go here [[https:// | + | * You can compile the info you found into [[tactics:dox|a dox file]] for the target. |
- | * enter IP address | + | * You can [[arms: |
- | * look for OrgName | + | |
- | * ??? | + | |
- | * PROFIT! | + | |
{{tag> | {{tag> |
diy/network-recon.1717815662.txt.gz · Last modified: 2024/08/06 05:54 (external edit)
Find this page online at: https://bestpoint.institute/diy/network-recon
Find this page online at: https://bestpoint.institute/diy/network-recon