From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Implementing DNS footprinting

Implementing DNS footprinting

- So let's go over how you can use a utility called whois and use it for reconnaissance. Whois is a query and response protocol that provides details about domain names, IP addresses, and other internet resources. It will help you in reconnaissance because you can retrieve registration information, including the owner, the administrative, and the technical context of an organization. In some cases, whois is not that reliable because a lot of organizations use proxies or the registrar's information as the main contact to remain of course private and anonymous. But for large organizations, you can obtain very significant information from these tools, and then you can combine these tools with other ones to perform passive reconnaissance. So what you're seeing in front of the screen is basically the main page on the Linux system, in this case, I'm running Kali Linux. So websploit on top of Kali Linux. And you can actually use the whois command to any domain. And I have here tesla.com…

Contents