All language subtitles for 3. Whois tool

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali Download
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,090 --> 00:00:01,780 Hello everybody and welcome back. 2 00:00:01,780 --> 00:00:08,940 And in this lecture we will cover one more foot printing tool which is basically called who is now the 3 00:00:08,940 --> 00:00:15,700 WHO is is an important for printing tool because it basically gives us a bunch of informations about 4 00:00:15,700 --> 00:00:17,480 the website that we scanned. 5 00:00:17,820 --> 00:00:23,670 Now the information can be used for multiple further attacks since the information that we get from 6 00:00:23,670 --> 00:00:30,540 the Web site from the voice command or program is basically who is who registered the website where 7 00:00:30,540 --> 00:00:31,450 is it registered. 8 00:00:31,470 --> 00:00:33,900 Which date does the registration expires. 9 00:00:33,930 --> 00:00:41,250 We get a bunch of addresses telephone numbers email addresses and bunch of the other options so let 10 00:00:41,250 --> 00:00:48,120 us just type here just who is it is installed in the clinic so you don't need to install it. 11 00:00:48,150 --> 00:00:50,030 You will have it already there. 12 00:00:50,130 --> 00:00:55,580 And as we can see what the usage is is who is then the option then the object. 13 00:00:55,590 --> 00:00:58,010 These are bunch of the options that you have. 14 00:00:58,050 --> 00:01:02,690 We will not cover it and we will just basically scan the site with the host option. 15 00:01:02,940 --> 00:01:05,670 So we will just type here. 16 00:01:05,670 --> 00:01:11,040 Let's scan a big site for example so we can so that we can get a bunch of the information. 17 00:01:11,040 --> 00:01:12,650 So CNN dot com. 18 00:01:13,050 --> 00:01:16,230 If you type here who is CNN dot com. 19 00:01:16,230 --> 00:01:25,770 It should print out a bunch of the publicly available information about that Web site let us just wait 20 00:01:25,770 --> 00:01:29,140 for this to finish it shouldn't take too long. 21 00:01:31,820 --> 00:01:32,950 Here we go now. 22 00:01:32,990 --> 00:01:39,350 First thing we see right here is that the notice one which says you're not authorized to access a query 23 00:01:39,440 --> 00:01:44,990 or who is database through the use of high volume automated electronic process or for the purpose or 24 00:01:44,990 --> 00:01:51,260 process or purposes of using data in any manner that violates those these Terms of Use. 25 00:01:53,180 --> 00:01:55,670 So basically this is not illegal. 26 00:01:55,670 --> 00:02:00,320 You can see right here by submitting a who is query you agree to abide by the following in terms of 27 00:02:00,320 --> 00:02:01,220 use. 28 00:02:01,370 --> 00:02:05,400 You agree that you may use the data only for lawful purposes. 29 00:02:05,450 --> 00:02:12,440 So basically you shouldn't be using any of these data for any of the attacks that will cover if you 30 00:02:12,440 --> 00:02:17,210 do not have permission to do so we'll just check out the data. 31 00:02:17,210 --> 00:02:19,300 We will not use it for any further attacks. 32 00:02:19,310 --> 00:02:23,100 So let's just see what we got from this comment. 33 00:02:23,300 --> 00:02:27,070 As you can see the first thing we have here is the domain name that we typed. 34 00:02:27,140 --> 00:02:35,420 CNN dot com the registry domain I.D. we can see that the registry who is server is this one. 35 00:02:35,420 --> 00:02:38,180 Now most of these commands do not really interest us. 36 00:02:38,180 --> 00:02:43,070 We can see this could be possibly interesting for us which is the name server it would be useful for 37 00:02:43,070 --> 00:02:44,850 some of these DNS attacks. 38 00:02:45,110 --> 00:02:50,500 But until then we will just check out all of these options. 39 00:02:50,510 --> 00:02:53,360 Let me just see if there is anything interesting right here. 40 00:02:53,360 --> 00:02:55,950 Register abuse contact e-mail. 41 00:02:55,970 --> 00:02:58,490 We can see an e-mail right here. 42 00:02:58,490 --> 00:03:05,940 Contact phone registry expiry date so we can see when does it expire. 43 00:03:06,090 --> 00:03:07,450 Creation Date. 44 00:03:07,590 --> 00:03:09,230 Updated date. 45 00:03:09,320 --> 00:03:12,900 It does go a little bit down here. 46 00:03:12,900 --> 00:03:13,800 Terms of Use. 47 00:03:13,800 --> 00:03:16,530 OK registry the main idea. 48 00:03:16,530 --> 00:03:20,010 This is basically all that we seen already. 49 00:03:22,500 --> 00:03:28,350 So here are some of the publicly available information so you can see the registrant email team group 50 00:03:28,410 --> 00:03:29,550 at Turner dot com. 51 00:03:29,550 --> 00:03:35,320 So for example if you were an attacker and you were hard to test a company and you test their their 52 00:03:35,380 --> 00:03:41,340 website ideas and you be a bunch of these emails you can use them for some of these further attacks 53 00:03:41,370 --> 00:03:48,390 such as a malware sending you can send a malware for example from this email is just a hypothetical 54 00:03:48,390 --> 00:03:49,720 example. 55 00:03:50,010 --> 00:03:55,710 It can be used for somebody for their attacks such as sending malware to this email and hopefully waiting 56 00:03:55,710 --> 00:04:02,540 for someone to open it then you will have a backdoor install on the inside of the company. 57 00:04:02,550 --> 00:04:09,950 So here we can see more of the publicly available options such as directs city state postal code country 58 00:04:10,910 --> 00:04:20,010 bunch of the other mobile phones emails as we said here down here we just see another email right here 59 00:04:20,160 --> 00:04:25,180 and the name server as we can see this can be useful. 60 00:04:25,290 --> 00:04:26,300 Let me just check you. 61 00:04:26,300 --> 00:04:34,340 That is that so basically you use this command in order to gather more information about the company. 62 00:04:34,570 --> 00:04:38,230 It surely can provide some of the information you might need. 63 00:04:38,830 --> 00:04:45,090 So in order to for example say this to a file as we did in the previous command in the previous lecture 64 00:04:45,100 --> 00:04:51,810 with Nick though let me just see if it has an option to save to a file. 65 00:04:51,940 --> 00:04:54,440 I'm not sure if it does but if it doesn't. 66 00:04:54,520 --> 00:04:58,540 You can do that with simply a digital screen. 67 00:04:58,760 --> 00:05:01,150 Here let me go to the root directory. 68 00:05:02,320 --> 00:05:03,930 So we're in the root directory. 69 00:05:03,940 --> 00:05:13,260 You can just appeared in command and you can type the arrow into result of the XY now. 70 00:05:13,320 --> 00:05:21,590 It won't print out anything here I believe and it will print all of the output into the result a text 71 00:05:21,680 --> 00:05:22,020 file. 72 00:05:22,770 --> 00:05:27,780 So when this finishes we should have a file with all of these things written to it. 73 00:05:27,810 --> 00:05:34,680 As you can see we didn't get any output but if we click here unless we could type here unless we can 74 00:05:34,680 --> 00:05:40,590 see the result that 60 let's get that file and we should have all of our information available in that 75 00:05:40,590 --> 00:05:45,360 file now so you can send it to someone if you want to or you can just have it. 76 00:05:45,420 --> 00:05:49,340 So you don't have to type the command every time in order to check something out. 77 00:05:49,440 --> 00:05:56,620 Now since I don't need a file I will just delete it and that's basically it for this program. 78 00:05:56,730 --> 00:05:59,590 You will find it useful sometimes and sometimes not. 79 00:05:59,610 --> 00:06:06,930 But in the next lecture we will cover the email harvesting which will use a program called harvester. 80 00:06:06,980 --> 00:06:09,440 I'm truly sure if it's installed. 81 00:06:15,180 --> 00:06:16,040 Yeah I'm sure. 82 00:06:16,040 --> 00:06:20,640 Yeah it is installed in the clinic so we will cover it in the next lecture. 83 00:06:20,800 --> 00:06:24,780 And until then you can practice these two programs that we covered. 84 00:06:24,840 --> 00:06:30,390 From now on including the Google hacking and NICTA and you can also practice with the WHO is program 85 00:06:31,320 --> 00:06:34,400 to find as much information as you can. 86 00:06:34,530 --> 00:06:38,820 Now the sit for this lecture and I hope I see you in next tutorial by. 8771

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.