Difference between revisions of "Reconnaissance"

From Gender and Tech Resources

(Created page with "=== Querying DNS servers === The <em>whois</em> system is used by system administrators to obtain contact information for IP address assignments or domain name administrators....")
 
m
Line 1: Line 1:
=== Querying DNS servers ===
+
== Querying DNS servers ==
The <em>whois</em> system is used by system administrators to obtain contact information for IP address assignments or domain name administrators. <em>Dig</em> is a networking tool that can query DNS servers for information. It can be very helpful for diagnosing problems with domain pointing and is a good way to verify that your server configuration is working. An alternative to <em>dig</em> is a command called <em>host</em>. This command functions in a very similar way to dig, with many of the same options. And if <em>dig</em> and <em>whois</em> do not provide you with enough information, tools like <em>dnsmap</em> and <em>dnsenum</em> can be handy.
+
The <code>whois</code> system is used by system administrators to obtain contact information for IP address assignments or domain name administrators. <code>dig</code> is a networking tool that can query DNS servers for information. It can be very helpful for diagnosing problems with domain pointing and is a good way to verify that your server configuration is working. An alternative to <code>dig</code> is a command called <code>host</code>. This command functions in a very similar way to dig, with many of the same options. And if <code>dig</code> and <code>whois</code> do not provide you with enough information, tools like <code>dnsmap</code> and <code>dnsenum</code> can be handy.
  
=== Enumerating targets ===
+
== Enumerating targets ==
Enumerating targets on your local network can be done with <em>nmap</em>, <em>arping</em>, <em>hping</em> and <em>fping</em>. The last three allow for constructing arbitrary packets for almost any networking protocol, for analysis of replies.
+
Enumerating targets on a local network can be done with <code>nmap</code>, <code>arping</code>, <code>hping</code> and <code>fping</code>. The last three allow for constructing arbitrary packets for almost any networking protocol, for analysis of replies.
 +
 
 +
== Resources ==
 +
* Hack Back! A DIY Guide for Those Without the Patience to Wait for Whistleblowers http://leaksource.info/2014/08/09/hack-back-a-diy-guide-for-those-without-the-patience-to-wait-for-whistleblowers/

Revision as of 20:41, 12 August 2015

Querying DNS servers

The whois system is used by system administrators to obtain contact information for IP address assignments or domain name administrators. dig is a networking tool that can query DNS servers for information. It can be very helpful for diagnosing problems with domain pointing and is a good way to verify that your server configuration is working. An alternative to dig is a command called host. This command functions in a very similar way to dig, with many of the same options. And if dig and whois do not provide you with enough information, tools like dnsmap and dnsenum can be handy.

Enumerating targets

Enumerating targets on a local network can be done with nmap, arping, hping and fping. The last three allow for constructing arbitrary packets for almost any networking protocol, for analysis of replies.

Resources