linux--Network Intelligence Collection (summary. Dry goods + combat)

Source: Internet
Author: User

Here is a piece of dry goods on the 2cto.com, and I have compiled some useful tools according to these dry goods http://m.2cto.com/article/201309/245214.html

A few simple steps from an attacker's perspective:

1, to determine their goals, the goal can be a network, Web applications, organizations or individuals. In our world, the search for information is also known as casing.

2. Advantageous collection techniques on various different goals:

  A, the Internet

Valid data:

Company's archived data

Company website (Web page)

Privacy Policy used in the application

Security policies used in the application

Customer Information

Testimonials/Reviews

Precise location Details

Employee information (location, contact, area of interest, etc.).

Check the source code of the Web page comments can also obtain valid information

Command description: Whois "DNS"

--------------------------------------------------------------------------------------------------------------- -------------------------------------------------------

Using data to obtain authorization:

Hackers/attackers Use this information as usernames to obtain any authorized network, routers, etc., and hackers can use the following sources listed below for any employee of the phone number, physical address:

Www.phonenumbers.com

Www.411.com

Www.yellowpages.com

A phone number, you can also take advantage of social engineering techniques. Additional information can be from these sites such as:

Www.ussearch.com

Www.zabasearch.com

Www.pipl.com

Use information to find weaknesses:

The tool is an intelligence collection Maltego tool.

(3) Select parameters:

-A Search all databases

-C Find the smallest match that contains a Mnt-irt attribute

-D Returns the proxy object for the DNS reverse lookup at the same time (requires support for the RPSL protocol)

-F Fast Output raw data

-H Hide Legal Notice content

-I ATTR a reverse query

-l reduce accuracy to a level of query (requires support for RPSL protocol)

-L Find all low precision matches

-M find first level high accuracy match

-M find all high accuracy matches

-R Turn off recursive queries when querying contact information

-r display local domain name object copy

-X Exact Match

-h[Host] Connect to the specified host server

-p[Port] Connect to the specified port port

-t[Type] Query specified type Object header information

-t[Type] Find objects of the specified type

-v[Type] query specifies type Object redundancy information

-Q [version | type] Query specific server information (requires support for RPSL protocol)

B. Windows leverages

ACLs for these complex routers (access control lists). If enabled, you cannot do tracerouting from the client and other common tests. In this case, people can still 53,dns data by sending the port of the packet. So our command is a route trace as follows:

Traceroute –p-resources.infosecinstitute.com-sends a packet via 53 port, DNS, and obtains route tracking information from the complex router ACL access control list.

DNS=>IP, but IP! =>dns, so configuring DNS security is extremely important

Another important thing to check out Tracerouting is to ask for DNS enumeration. This is the most important part of network intelligence gathering. In general, this uses DNS hostnames to map to IP addresses and vice versa. DNS security must be configured, otherwise someone can get information for each bit of the entire organization through the region. Zone transfer is the most common and potential weakness of a server that is misconfigured. This can reveal valuable information about the target.

If the server has this vulnerability, it allows a second server to update itself from the primary server. This is why an attacker only performs zone transfers on a secondary server. This is why attackers only perform zone transfers on secondary servers. Therefore, many servers give information to all regions.

Command Description:

Valid information for mining DNS servers: Dig infosecinstitute.com

Staging zones and DNS enumeration (in the case of DNS server configuration Security): Dnsenum Dnsmap

linux--Network Intelligence Collection (summary. Dry goods + combat)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.