Passive Reconnaissance - Whois Lookup Tutorial

Поділитися
Вставка
  • Опубліковано 1 жов 2024
  • In this video, I demonstrate how to utilize the whois query protocol for passive information gathering. WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system but is also used for a wider range of other information
    📈 SUPPORT US:
    Patreon: / hackersploit
    Merchandise: teespring.com/...
    SOCIAL NETWORKS:
    Reddit: / hackersploit
    Twitter: / hackersploit
    Instagram: / hackersploit
    LinkedIn: / 18713892
    WHERE YOU CAN FIND US ONLINE:
    Blog: hsploit.com/
    HackerSploit - Open Source Cybersecurity Training: hackersploit.org/
    HackerSploit Academy: www.hackersplo...
    HackerSploit Discord: / discord
    LISTEN TO THE CYBERTALK PODCAST:
    Spotify: open.spotify.c...
    We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    #PenetrationTesting#OSINT

КОМЕНТАРІ • 39

  • @amitharash5469
    @amitharash5469 4 роки тому +26

    Epilepsy warning, nice video though

  • @kreighcarterproductions7856

    🎯 Key Takeaways for quick navigation:
    00:14 🕵️ WHOIS is a query and response protocol used to retrieve registrant information for internet properties like domains and IP blocks.
    01:22 🌐 Numerous online tools and a pre-installed utility in Linux and Windows allow you to perform WHOIS domain lookups.
    02:19 📧 Attackers use WHOIS information to find useful emails and owner names for phishing campaigns or profiling targets.
    03:16 🤖 WHOIS data includes details like domain expiration, registrar abuse contact email, name servers, DNSSEC, and registrant information.
    04:50 🚫 WHOIS Guard protects registrant information from being publicly available, making it harder for attackers to access sensitive data.
    Made with HARPA AI

  • @EbenezerScroogeMcDuck
    @EbenezerScroogeMcDuck 2 роки тому +1

    I went to the visitor section of Cpanel, a few IPs belong to Google (net-34 etc), assuming these are crawlers or indexing etc.. Then I get some really weird ones that don't make sense to me. They're as follows: TaoBao (an online market), Linode, Naver Cloud Corp, Unicom-Ha etc.. the ones I know that are human usually say comcast, centurylink, virgin (usually a thai user visiting) etc.. the most confusing one is APNIC, can't tell what its purpose is when it appears in the list.
    Question is, what is the purpose of Taobao, linode, naver, unicom, apnic visiting? Is it a bot that scrapes data or is there some kind of indexing going on? cataloging?

    • @sahilshah9678
      @sahilshah9678 2 роки тому

      first of all bro how did you go under the cpanel?

  • @shivanshshukla5978
    @shivanshshukla5978 4 роки тому

    Hello.....man whenever i ran ipconfig/iwconfig or anyother command kali shows an error but executes the command as sudo....idk whats wrong....the error is same aa the one which appears when we try to execute commands when we are downloading/update software....can you help?

  • @ricardoacostatorres1350
    @ricardoacostatorres1350 4 роки тому +1

    weird white flashing

  • @zerox5596
    @zerox5596 9 місяців тому

    How do I see what says "Redacted for Privacy"?

  • @muyivushafiq8389
    @muyivushafiq8389 4 роки тому +1

    I am very happy that you are back #HACKERSPLOIT

  • @josephmensah5203
    @josephmensah5203 2 роки тому

    How can the domain be accessed if the domain is privacy protected. Is there a tool for that "Brute force" 😊

  • @Odolwa2
    @Odolwa2 2 роки тому

    Looking at visitor IPs, how can I tell if they are users or bots/crawlers?

  • @crafty2145
    @crafty2145 4 роки тому +2

    Thanks for watching!
    תודה על הצפייה!
    😁 it will be coll if youll add this to your description

  • @Neos.Helios
    @Neos.Helios 4 роки тому

    Does the site know that the person scanned them by using whois?

  • @jhansinandam8961
    @jhansinandam8961 4 роки тому

    How to know the domain names of ip address with the help of whois lookup...I am unable to get the domain name of 165.22.245.174

    • @karthikchowdary9340
      @karthikchowdary9340 Рік тому

      It maybe because they don't have a web service related to that IP

  • @zi8071
    @zi8071 3 роки тому

    What can I do if someone copied my website? They made some slight changes but kept the same adress.

    • @ImadZeryouh
      @ImadZeryouh 3 роки тому

      Hire a foreign and ddos the website.

  • @vishnnuvijay9096
    @vishnnuvijay9096 3 роки тому

    Any cyber forensic student?

  • @fendularatsq2317
    @fendularatsq2317 4 роки тому

    Are power puff girls coming ?

  • @SurajYadav-sk4ce
    @SurajYadav-sk4ce 4 роки тому +1

    Best video ever seen 👍

  • @shuhaibnc1100
    @shuhaibnc1100 4 роки тому

    Fully Thunderstorms.

  • @alexiscruz9390
    @alexiscruz9390 4 роки тому

    Cool name

  • @jamesdickson3631
    @jamesdickson3631 4 роки тому

    Thanks pa

  • @ThriveTalesTV
    @ThriveTalesTV 4 роки тому

    good info .Thanks

  • @shivanshshukla5978
    @shivanshshukla5978 4 роки тому

    Can you tell us how to give the root permissions to kali? or else if you can share the modified kali you are using it would be helpful

    • @santhosh-duraipandiyan
      @santhosh-duraipandiyan 4 роки тому

      By default kali comes with root user ! Just login as root . Or use sudo command if you're logged in as another user .

    • @shivanshshukla5978
      @shivanshshukla5978 4 роки тому +1

      @@santhosh-duraipandiyan yeah man i know that....but wasnt able to get root permissions to the user...please read the 2020 kali manual...it says its not been given root permissions..i can use sudo everytime but isnt that irritating? For every file u download or everytime u try to run iwconfig u use sudo...yeah....iwconfig isnt running without using sudo...thats why i asked him...i gave root permissions to kali but everytime i close the terminal it goes back to normal

    • @shivanshshukla5978
      @shivanshshukla5978 4 роки тому

      @@Crazy--Clown hey man i didnt ask u stuff...will u just stfu....i do know how to use google....i have done a research and then asked someone abt it...so please keep these idiotic suggestions to urself..

    • @santhosh-duraipandiyan
      @santhosh-duraipandiyan 4 роки тому +1

      @@shivanshshukla5978 oh in that case you can change user privilege in with visudo command. Go to playlist linux essentials for hackers in this channel and look for users and groups for instructions.

    • @shivanshshukla5978
      @shivanshshukla5978 4 роки тому +1

      @@santhosh-duraipandiyan thanks mate will check for sure

  • @infernocaptures8739
    @infernocaptures8739 3 роки тому

    How did you come to the idea of uploading a video with this crazy ass flashing going on? Seriously... that can be harmful

  • @ajaykumark107
    @ajaykumark107 4 роки тому +1

    Where can we get your deleted videos?

    • @irshadtarsoo7734
      @irshadtarsoo7734 4 роки тому

      @@Crazy--Clown no need to be rude man😀

    • @camiloflores5767
      @camiloflores5767 2 роки тому

      Hey, did you find the deleted videos?, im just starting this bootcamp and i noticed that there are some jumps between some videos

  • @QuantitativeAi
    @QuantitativeAi 4 роки тому

    HEY CAN U USE MACHINE LEARNING IN HACKING AUR ANY OTHER AI ALGO WILL U UPLOAD VIDEO BASED ON ABV IDEA IF YES THEN PLZ REPLY BTW BIG FAN
    ..