Practicals 1
Practicals 1
Practicals 1
1. DNS HARVESTING:
Execute the following command and observe the output. What useful informations can you find that can be used
for attack? NOTE: For this practical we will be using zonetransfer.me, which is intentionally made for pen test learning
a) DNS Enumeration
dnsenum zonetransfer.me
b) Zone transfer:
dig axfr @nsztm1.digi.ninja zonetransfer.me
2. Metadata Extraction
In this lab we will learn how to find valuable data for structuring our attack in documents belonging to
the target company. The files you will examine in this lab are:
WidgetStatisticalAnalysis.xls
WidgetStatisticalWhitepaper.doc
WidgetStatisticalWhitepaper.pdf
You can use any tools you want but all you really need is exiftool and strings (if some of these are not
installed please install first).
ExifTool syntax:
exiftool filename
To run strings:
strings filename
Try this for each of the files, and answers the following questions:
We will use Bing Web hostname enumerator module and try to find additional subdomains on the
https://www.facebook.com/ website:
a) Load the module:
• recon/domainshosts/bing_domain_web
• show info c (displays the information about the module)
b) Set the target and execute (you can also use some of the domains identified in the previous
practical)
• load recon/domains-hosts/bing_domain_web
• run
5. Execute the command below using nmap. Check the output and assess the relevance to a
potential penetration test.
nmap --script dns-brute --script-args dns-brute.domain=inpt.ac.ma
6. Go to https://centralops.net/co/ and enter a domain of your choice. Use all available options and
let centralops do the scaning for you. Observe the output and analyze it.
7.
8. Search GitHub for MegaCorpOne account. Within this account let us try and find some sensitive
information. Search for any files with the word “users” in the name: filename:users
Try similar searches across entire GitHub (note, you will need to register and login)