Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,090 --> 00:00:01,780
Hello everybody and welcome back.
2
00:00:01,780 --> 00:00:08,940
And in this lecture we will cover one more foot printing tool which is basically called who is now the
3
00:00:08,940 --> 00:00:15,700
WHO is is an important for printing tool because it basically gives us a bunch of informations about
4
00:00:15,700 --> 00:00:17,480
the website that we scanned.
5
00:00:17,820 --> 00:00:23,670
Now the information can be used for multiple further attacks since the information that we get from
6
00:00:23,670 --> 00:00:30,540
the Web site from the voice command or program is basically who is who registered the website where
7
00:00:30,540 --> 00:00:31,450
is it registered.
8
00:00:31,470 --> 00:00:33,900
Which date does the registration expires.
9
00:00:33,930 --> 00:00:41,250
We get a bunch of addresses telephone numbers email addresses and bunch of the other options so let
10
00:00:41,250 --> 00:00:48,120
us just type here just who is it is installed in the clinic so you don't need to install it.
11
00:00:48,150 --> 00:00:50,030
You will have it already there.
12
00:00:50,130 --> 00:00:55,580
And as we can see what the usage is is who is then the option then the object.
13
00:00:55,590 --> 00:00:58,010
These are bunch of the options that you have.
14
00:00:58,050 --> 00:01:02,690
We will not cover it and we will just basically scan the site with the host option.
15
00:01:02,940 --> 00:01:05,670
So we will just type here.
16
00:01:05,670 --> 00:01:11,040
Let's scan a big site for example so we can so that we can get a bunch of the information.
17
00:01:11,040 --> 00:01:12,650
So CNN dot com.
18
00:01:13,050 --> 00:01:16,230
If you type here who is CNN dot com.
19
00:01:16,230 --> 00:01:25,770
It should print out a bunch of the publicly available information about that Web site let us just wait
20
00:01:25,770 --> 00:01:29,140
for this to finish it shouldn't take too long.
21
00:01:31,820 --> 00:01:32,950
Here we go now.
22
00:01:32,990 --> 00:01:39,350
First thing we see right here is that the notice one which says you're not authorized to access a query
23
00:01:39,440 --> 00:01:44,990
or who is database through the use of high volume automated electronic process or for the purpose or
24
00:01:44,990 --> 00:01:51,260
process or purposes of using data in any manner that violates those these Terms of Use.
25
00:01:53,180 --> 00:01:55,670
So basically this is not illegal.
26
00:01:55,670 --> 00:02:00,320
You can see right here by submitting a who is query you agree to abide by the following in terms of
27
00:02:00,320 --> 00:02:01,220
use.
28
00:02:01,370 --> 00:02:05,400
You agree that you may use the data only for lawful purposes.
29
00:02:05,450 --> 00:02:12,440
So basically you shouldn't be using any of these data for any of the attacks that will cover if you
30
00:02:12,440 --> 00:02:17,210
do not have permission to do so we'll just check out the data.
31
00:02:17,210 --> 00:02:19,300
We will not use it for any further attacks.
32
00:02:19,310 --> 00:02:23,100
So let's just see what we got from this comment.
33
00:02:23,300 --> 00:02:27,070
As you can see the first thing we have here is the domain name that we typed.
34
00:02:27,140 --> 00:02:35,420
CNN dot com the registry domain I.D. we can see that the registry who is server is this one.
35
00:02:35,420 --> 00:02:38,180
Now most of these commands do not really interest us.
36
00:02:38,180 --> 00:02:43,070
We can see this could be possibly interesting for us which is the name server it would be useful for
37
00:02:43,070 --> 00:02:44,850
some of these DNS attacks.
38
00:02:45,110 --> 00:02:50,500
But until then we will just check out all of these options.
39
00:02:50,510 --> 00:02:53,360
Let me just see if there is anything interesting right here.
40
00:02:53,360 --> 00:02:55,950
Register abuse contact e-mail.
41
00:02:55,970 --> 00:02:58,490
We can see an e-mail right here.
42
00:02:58,490 --> 00:03:05,940
Contact phone registry expiry date so we can see when does it expire.
43
00:03:06,090 --> 00:03:07,450
Creation Date.
44
00:03:07,590 --> 00:03:09,230
Updated date.
45
00:03:09,320 --> 00:03:12,900
It does go a little bit down here.
46
00:03:12,900 --> 00:03:13,800
Terms of Use.
47
00:03:13,800 --> 00:03:16,530
OK registry the main idea.
48
00:03:16,530 --> 00:03:20,010
This is basically all that we seen already.
49
00:03:22,500 --> 00:03:28,350
So here are some of the publicly available information so you can see the registrant email team group
50
00:03:28,410 --> 00:03:29,550
at Turner dot com.
51
00:03:29,550 --> 00:03:35,320
So for example if you were an attacker and you were hard to test a company and you test their their
52
00:03:35,380 --> 00:03:41,340
website ideas and you be a bunch of these emails you can use them for some of these further attacks
53
00:03:41,370 --> 00:03:48,390
such as a malware sending you can send a malware for example from this email is just a hypothetical
54
00:03:48,390 --> 00:03:49,720
example.
55
00:03:50,010 --> 00:03:55,710
It can be used for somebody for their attacks such as sending malware to this email and hopefully waiting
56
00:03:55,710 --> 00:04:02,540
for someone to open it then you will have a backdoor install on the inside of the company.
57
00:04:02,550 --> 00:04:09,950
So here we can see more of the publicly available options such as directs city state postal code country
58
00:04:10,910 --> 00:04:20,010
bunch of the other mobile phones emails as we said here down here we just see another email right here
59
00:04:20,160 --> 00:04:25,180
and the name server as we can see this can be useful.
60
00:04:25,290 --> 00:04:26,300
Let me just check you.
61
00:04:26,300 --> 00:04:34,340
That is that so basically you use this command in order to gather more information about the company.
62
00:04:34,570 --> 00:04:38,230
It surely can provide some of the information you might need.
63
00:04:38,830 --> 00:04:45,090
So in order to for example say this to a file as we did in the previous command in the previous lecture
64
00:04:45,100 --> 00:04:51,810
with Nick though let me just see if it has an option to save to a file.
65
00:04:51,940 --> 00:04:54,440
I'm not sure if it does but if it doesn't.
66
00:04:54,520 --> 00:04:58,540
You can do that with simply a digital screen.
67
00:04:58,760 --> 00:05:01,150
Here let me go to the root directory.
68
00:05:02,320 --> 00:05:03,930
So we're in the root directory.
69
00:05:03,940 --> 00:05:13,260
You can just appeared in command and you can type the arrow into result of the XY now.
70
00:05:13,320 --> 00:05:21,590
It won't print out anything here I believe and it will print all of the output into the result a text
71
00:05:21,680 --> 00:05:22,020
file.
72
00:05:22,770 --> 00:05:27,780
So when this finishes we should have a file with all of these things written to it.
73
00:05:27,810 --> 00:05:34,680
As you can see we didn't get any output but if we click here unless we could type here unless we can
74
00:05:34,680 --> 00:05:40,590
see the result that 60 let's get that file and we should have all of our information available in that
75
00:05:40,590 --> 00:05:45,360
file now so you can send it to someone if you want to or you can just have it.
76
00:05:45,420 --> 00:05:49,340
So you don't have to type the command every time in order to check something out.
77
00:05:49,440 --> 00:05:56,620
Now since I don't need a file I will just delete it and that's basically it for this program.
78
00:05:56,730 --> 00:05:59,590
You will find it useful sometimes and sometimes not.
79
00:05:59,610 --> 00:06:06,930
But in the next lecture we will cover the email harvesting which will use a program called harvester.
80
00:06:06,980 --> 00:06:09,440
I'm truly sure if it's installed.
81
00:06:15,180 --> 00:06:16,040
Yeah I'm sure.
82
00:06:16,040 --> 00:06:20,640
Yeah it is installed in the clinic so we will cover it in the next lecture.
83
00:06:20,800 --> 00:06:24,780
And until then you can practice these two programs that we covered.
84
00:06:24,840 --> 00:06:30,390
From now on including the Google hacking and NICTA and you can also practice with the WHO is program
85
00:06:31,320 --> 00:06:34,400
to find as much information as you can.
86
00:06:34,530 --> 00:06:38,820
Now the sit for this lecture and I hope I see you in next tutorial by.
8771
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.