From the course: Kali Linux Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Using DNS for passive reconnaissance - Linux Tutorial
From the course: Kali Linux Essential Training
Using DNS for passive reconnaissance
- [Instructor] Let's go to the application menu information gathering DNS analysis and look at the first of its tools, DNS enum. This tool's used to enumerate information for a system. It provides the name service for a domain, identify subdomains, provides the associated mail servers, and does zone transfers, if it can, to check for more information on subdomains. Note that DNS enumeration doesn't interrogate the server itself. It just looks at the public records of server registration. Let's check the DNS information for TikTok. dnsenum tiktok.com. The first thing we get is the host addresses in the 65.9 range. This is followed by four associated name servers in the 205.251 range. The name servers are used to translate from a real world name such as tiktok.com to the IP address of that system. Having multiple name servers provides redundancy in the event that one or more are unavailable. Then we have the mail server…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Information gathering with Kali1m 19s
-
(Locked)
Using deep magic for reconnaissance2m 17s
-
(Locked)
Using DNS for passive reconnaissance3m 20s
-
(Locked)
Using Shodan to enumerate the internet4m 30s
-
(Locked)
Active target reconnaissance7m 9s
-
(Locked)
Taking a quick peek at a web server1m 46s
-
(Locked)
-
-
-
-
-