Active Information Gathering

Gauloran

Moderasyon Ekibi Lideri
7 Tem 2013
8,207
4
686
THSe2J.png


• What is Active Information Gathering?
• Information Gathering with DNS Protocol
• What is the Dig Command and How to Use It?
• Nslookup
• What is Banner Capture and How to Use It?
• What is TRACEROUTE and How is it Used?
• What is TCPTRACEROUTE How to use it?
• What is URLCrazy How to use it?
• Finding a Host
• Information Gathering with Dmitry
• DNSMAP Tutorial
• Fierce Tutorial
• NMAP Tutorial


x1BBWJ.png


What is Active Information Gathering?

Active information gathering means direct communication with the target. It's the collection of information by examining the logs of the target.

x1BBWJ.png


Information Gathering with DNS Protocol

You can find out by using the "Nslookup" and "Dig" tools in Kali.

x1BBWJ.png


What is the Dig Command and How to Use It?

Dig is a tool for looking at the target site's DNS records.

It shows us the address records connected to the domain

Kod:
dig website address

f36MG9.jpg


"dig website name–t NS" command shows us NS (Name Server) records

Kod:
dig websitename -t NS

d0PWa1.jpg


"Dig website name -t txt" command is used to see TXT records.

Kod:
dig websitename –t txt

UGTxK3.jpg


"Dig website name –t MX" command shows us MX records.

Kod:
dig websitename -t MX

BPOyMC.jpg


The "dig –x ip address" command offers us the old records of the site.

Kod:
dig –x ipaddress

Tx93cT.jpg


x1BBWJ.png


Nslookup

Kod:
nslookup websiteaddress

P6xMMd.jpg


What is Banner Capture and How to Use It?

Banner capture is used to get information about the version and system used in the target system. A request is sent to an open port of the target system and the system sends some values ​​to us. For this method, we can use applications such as NetCat, nTelnet, Nmap in Linux.

Kod:
nc –v websiteaddress 80

UxSbUd.jpg


What is TRACEROUTE and How is it Used?

Traceroute is the command used to find out which hosts a packet passed through until it reaches its destination. It uses the ICMP protocol.

You can open "cmd" on Windows and use the code below.

Kod:
You can open "cmd" on Windows and use the code below.

IfSB0P.jpg


I'll tell you from different country's website :)
tracert x site

1NQz7c.jpg


As you can see, the package data came to us.

What is TCPTRACEROUTE How to use it?

TRACEROUTE uses the ICMP protocol. However, the method in TRACEROUTE does not work in some systems because the ICMP protocol is closed.

Kod:
tcptraceroute website's portnumber

U3QyCf.jpg


What is URLCrazy How to use it?

It lists the domains similar to the target domain.

Kod:
urlcrazy site links -p

-p means popular and it searches popular search engines.

NSTHGR.jpg


Finding a Host

it is the method used to find the host of the system.

Kod:
host “website address”

56yPMU.jpg


Information Gathering with Dmitry

Dmitry is the information gathering tool in Kali. It provides us with information such as e-mail, TCP port scanning, Whois.

With this code, it allows us to collect information about the website by making a general scan of the website and creating a file named result.txt on the desktop.

Kod:
dmitry -winsepfb -o /root/Masaüstü/sonuc.txt siteismi

it allows us to collect information about the website by making a general scan of the website and creating a file named result.txt on the desktop.

Kod:
dmitry -winsepfb -o /root/Masaüstü/sonuc.txt siteismi

d9CcAC.jpg


VxCLfQ.jpg


This is the image from the text file.

CddU5G.jpg


DNSMAP Tutorial

DNSMAP is used to learn the subdomains of the intermediary site.

Kod:
dnsmap websiteaddress

2Pae2T.jpg


Fierce Tutorial

Fierce is a tool for DNS zone transfer and subdomain detection.

Kod:
fierce –dns websiteaddress

NxNBI0.jpg


Q2HLN8.jpg


NMAP Tutorial

NMAP is a security scanner. It maps the scanned system and it can determine the position of running services. It shows the open ports of the system, which software the system is using, the physical device types, etc.

It provides a port number, port information, service information regarding port number.

Kod:
nmap ıpaddress

VLJATQ.jpg


255d59.jpg


I0VTQc.jpg


For UDP scanning

Kod:
nmap -sU ipaddress

For TCP scanning

Kod:
nmap -sT ipaddress

You can use the parameters, but they take a really long time and make the internet very slow.

Kod:
nmap -sS -F ipaddress

It will scan the 100 most used ports.

Kod:
nmap -sS -px ipaddress

You must write the port number instead of X. It'll only scan the port that you typed.

Source: https://www.turkhackteam.org/web-server-guvenligi/1827004-aktif-bilgi-toplama-whitered.html
Çevirmen/Translator Gauloran
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.