Passive Reconnaissance - Whois Lookup Tutorial
Вставка
- Опубліковано 1 жов 2024
- In this video, I demonstrate how to utilize the whois query protocol for passive information gathering. WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system but is also used for a wider range of other information
📈 SUPPORT US:
Patreon: / hackersploit
Merchandise: teespring.com/...
SOCIAL NETWORKS:
Reddit: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
LinkedIn: / 18713892
WHERE YOU CAN FIND US ONLINE:
Blog: hsploit.com/
HackerSploit - Open Source Cybersecurity Training: hackersploit.org/
HackerSploit Academy: www.hackersplo...
HackerSploit Discord: / discord
LISTEN TO THE CYBERTALK PODCAST:
Spotify: open.spotify.c...
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#PenetrationTesting#OSINT
Epilepsy warning, nice video though
🎯 Key Takeaways for quick navigation:
00:14 🕵️ WHOIS is a query and response protocol used to retrieve registrant information for internet properties like domains and IP blocks.
01:22 🌐 Numerous online tools and a pre-installed utility in Linux and Windows allow you to perform WHOIS domain lookups.
02:19 📧 Attackers use WHOIS information to find useful emails and owner names for phishing campaigns or profiling targets.
03:16 🤖 WHOIS data includes details like domain expiration, registrar abuse contact email, name servers, DNSSEC, and registrant information.
04:50 🚫 WHOIS Guard protects registrant information from being publicly available, making it harder for attackers to access sensitive data.
Made with HARPA AI
I went to the visitor section of Cpanel, a few IPs belong to Google (net-34 etc), assuming these are crawlers or indexing etc.. Then I get some really weird ones that don't make sense to me. They're as follows: TaoBao (an online market), Linode, Naver Cloud Corp, Unicom-Ha etc.. the ones I know that are human usually say comcast, centurylink, virgin (usually a thai user visiting) etc.. the most confusing one is APNIC, can't tell what its purpose is when it appears in the list.
Question is, what is the purpose of Taobao, linode, naver, unicom, apnic visiting? Is it a bot that scrapes data or is there some kind of indexing going on? cataloging?
first of all bro how did you go under the cpanel?
Hello.....man whenever i ran ipconfig/iwconfig or anyother command kali shows an error but executes the command as sudo....idk whats wrong....the error is same aa the one which appears when we try to execute commands when we are downloading/update software....can you help?
weird white flashing
How do I see what says "Redacted for Privacy"?
I am very happy that you are back #HACKERSPLOIT
How can the domain be accessed if the domain is privacy protected. Is there a tool for that "Brute force" 😊
Looking at visitor IPs, how can I tell if they are users or bots/crawlers?
Thanks for watching!
תודה על הצפייה!
😁 it will be coll if youll add this to your description
Does the site know that the person scanned them by using whois?
How to know the domain names of ip address with the help of whois lookup...I am unable to get the domain name of 165.22.245.174
It maybe because they don't have a web service related to that IP
What can I do if someone copied my website? They made some slight changes but kept the same adress.
Hire a foreign and ddos the website.
Any cyber forensic student?
Are power puff girls coming ?
Best video ever seen 👍
Fully Thunderstorms.
Cool name
Thanks pa
good info .Thanks
Can you tell us how to give the root permissions to kali? or else if you can share the modified kali you are using it would be helpful
By default kali comes with root user ! Just login as root . Or use sudo command if you're logged in as another user .
@@santhosh-duraipandiyan yeah man i know that....but wasnt able to get root permissions to the user...please read the 2020 kali manual...it says its not been given root permissions..i can use sudo everytime but isnt that irritating? For every file u download or everytime u try to run iwconfig u use sudo...yeah....iwconfig isnt running without using sudo...thats why i asked him...i gave root permissions to kali but everytime i close the terminal it goes back to normal
@@Crazy--Clown hey man i didnt ask u stuff...will u just stfu....i do know how to use google....i have done a research and then asked someone abt it...so please keep these idiotic suggestions to urself..
@@shivanshshukla5978 oh in that case you can change user privilege in with visudo command. Go to playlist linux essentials for hackers in this channel and look for users and groups for instructions.
@@santhosh-duraipandiyan thanks mate will check for sure
How did you come to the idea of uploading a video with this crazy ass flashing going on? Seriously... that can be harmful
Where can we get your deleted videos?
@@Crazy--Clown no need to be rude man😀
Hey, did you find the deleted videos?, im just starting this bootcamp and i noticed that there are some jumps between some videos
HEY CAN U USE MACHINE LEARNING IN HACKING AUR ANY OTHER AI ALGO WILL U UPLOAD VIDEO BASED ON ABV IDEA IF YES THEN PLZ REPLY BTW BIG FAN
..