Passive Reconnaissance(정찰)
https://tryhackme.com/room/passiverecon
Learn about the essential tools for passive reconnaissance, such as whois, nslookup, and dig.
Reconnaissance(recon) can be defined as a preliminary survey to gather information about a target.
Whois is a request and respond protocol that follows the RFC3912 specification. The Whois server replies with various information related to the domain requested.
whois DOMAIN_NAME
We can find the IP address of a domain name using nslookup(Name Server Look UP)
Nslookup DOMAIN_NAME
Query type | Result |
---|---|
A | IPv4 Addresses |
AAAA | IPv6 Addresses |
CNAME | Canonical Name |
MX Mail | Servers |
SOA | Start of Authority |
TXT | TXT Recodes |
Ex) nslookup -type=MX tryhackme
For more advanced DNS queries and additional functionality, we can use dig(Domain Information Groper)
dig DOMAIN_NAME TYPE
DNS lookup tools can’t find subdomains on their own. (like tryhackme has the subdomains wiki.tryhackme.com, webmail.tryhackme.com…)
DNSDumpster offers detailed answers to DNS queries. : https://dnsdumpster.com/
It can be helpful to learn various pieces of information about the client’s network, without actively connecting to it. Shodan.io tries to connect to every device reachable online to build a search engine of connected “things” in contrast with a search engine for web pages.
Via this Shodan.io search result, we can learn several things related to our search, such as