diy:network-recon
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
diy:network-recon [2024/06/08 03:40] – [dig] Humphrey Boa-Gart | diy:network-recon [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 5: | Line 5: | ||
Lets say this site is, hypothetically, | Lets say this site is, hypothetically, | ||
- | ===== Finding IP Addresses & Other Basic Info ===== | + | ===== Finding IP Addresses & DNS Info ===== |
Every machine (or **host**) on the internet has an **IP address**, and every domain name resolves to an IP address. Domain names are only aliases for IP addresses because // | Every machine (or **host**) on the internet has an **IP address**, and every domain name resolves to an IP address. Domain names are only aliases for IP addresses because // | ||
Line 15: | Line 15: | ||
==== ping ==== | ==== ping ==== | ||
- | The classic '' | + | The classic '' |
$ ping scanme.nmap.org | $ ping scanme.nmap.org | ||
Line 38: | Line 38: | ||
==== nslookup ==== | ==== nslookup ==== | ||
- | Another commonly bundled cross-platform command, '' | + | Another commonly bundled cross-platform command, '' |
$ nslookup scanme.nmap.org | $ nslookup scanme.nmap.org | ||
Line 108: | Line 108: | ||
Read more [[https:// | Read more [[https:// | ||
- | ===== Web hosting ===== | ||
- | Every site is being hosted on someone' | + | ===== WHOIS ===== |
- | ==== Finding | + | [[wp> |
- | * go here http:// | + | WHOIS lookups are a great way to find out more information about a web site or IP address. They can clue you in to who the target uses for a host or domain |
- | * Enter the domain | + | |
- | * look for Registrar | + | |
- | === *nix based systems | + | ==== Domain Information ==== |
- | On all *nix based systems it's pretty | + | **WHOIS** lookups are extremely |
- | Usage example: | + | '' |
- | $ whois partyvan.info | + | $ whois nmap.org |
- | ==== Finding host ==== | + | The lengthy results of this command (which we will not paste here) reveal that Nmap does in fact use one of the aforementioned domain privacy services. It also shows that they use [[https:// |
- | Once you have an IP address, you can find out who is hosting a site. | + | ==== More IP Information ==== |
- | | + | '' |
- | * enter IP address | + | |
- | * look for OrgName | + | $ whois 45.33.32.156 |
- | * ??? | + | |
- | * PROFIT! | + | Running '' |
+ | |||
+ | ===== Browser Based Tools ===== | ||
+ | |||
+ | If you don't have access to the command line, there are a handful of sites you can use for DNS & WHOIS lookups in your browser: | ||
+ | |||
+ | | ||
+ | * [[https://lookup.icann.org/ | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | |||
+ | ===== More Things You Can Do ===== | ||
+ | |||
+ | Congratulations! You have now done the absolute bare minimum it takes to profile a web site. But what to do with this information? | ||
+ | |||
+ | * You can compile the info you found into [[tactics: | ||
+ | * You can [[arms: | ||
{{tag> | {{tag> |
diy/network-recon.1717818049.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/diy/network-recon
Find this page online at: https://bestpoint.institute/diy/network-recon