官术网_书友最值得收藏!

Offensive OSINT

The information that is targeted for collection is dependent on the initial goal of the penetration test. For example, if testers want to access personal health records, they will need the names and biographical information of relevant parties involved (third-party insurance companies, healthcare providers, head of IT operations professional, commercial suppliers, and so on), their usernames, and passwords. If the route of an attack involves social engineering, they may supplement this information with details that give credibility to the requests for information:

  • Domain names: Identification of the target for the attackers or penetration testers during an external scenario begins with domain names, which is the most crucial element of OSINT.
  • DNS reconnaissance and route mapping: Once a tester has identified target that has an online presence and contains items of interest, the next step is to identify the IP addresses and routes to the target.

Domain Name System (DNSreconnaissance is concerned with identifying who owns a particular domain or series of IP addresses (who is-type information), the DNS information defining the actual domain names and IP addresses assigned to the target, and the route between the penetration tester or the attacker and the final target.

This information gathering is semiactive – some of the information is available from freely available open sources, while other information is available from third parties, such as DNS registrars. Although the registrar may collect IP addresses and data concerning requests made by the attacker, it is rarely provided to the end target. The information that could be directly monitored by the target, such as DNS server logs, is almost never reviewed or retained. Because the information needed can be queried using a defined systematic and methodical approach, its collection can be automated.

In the following sections, we will discuss how easy it would be to enumerate all the domain names just by using simple tools from Kali Linux.

主站蜘蛛池模板: 乌拉特后旗| 安泽县| 太谷县| 清丰县| 昌乐县| 绥滨县| 织金县| 建昌县| 东明县| 汤阴县| 嘉定区| 巴南区| 乌鲁木齐县| 武鸣县| 会宁县| 晋江市| 团风县| 中江县| 长治市| 杨浦区| 武清区| 偏关县| 苏州市| 五寨县| 福鼎市| 海兴县| 杭锦后旗| 玛纳斯县| 富平县| 玉林市| 鄂伦春自治旗| 河南省| 大厂| 城步| 河源市| 婺源县| 晋中市| 邵阳市| 广平县| 儋州市| 安陆市|