Footprinting and Reconnaissance - singirikondamani/Noted GitHub Wiki
Gathering the information of the website any information like geolocation, DNS any etc.
Use the Tool : BillCpiher
Commands:
- Step:
Sudo su
→cd BillCipher
→run Python3 billcipher.py
- Step: Select the option from the list according to task.
- Step: Enter the target website and IP address (get the IP of the target domain).
- Step: Enter to run the tool and get the output and analysis and get the answer.
To check any domain or IP DNS zone transfer enabled or disabled use the below method
Use the Tools : DIG, BillCipher,DNSEnum,DNSRecon
Method-1:
- Step:
Sudo su
→cd BillCipher
→run Python3 billcipher.py
- Step: Select the option from the list according to task.
- Step: Enter the target website and IP address (get the IP of the target domain).
- Step: Enter to run the tool and get the output and analysis and get the answer.
Method-2:
- Step: dig the domain name name server →
dig ns <domain name>
- Step: after obtained the name server for from above command run zone transfer and check →
dig axfr @name.server/ip <domain name>
- Step: Analyze the answer if the output shows the fail to zone transfer answer accordinging.
- To Identify the name server Using the dig tool →
dig ns <domain name>
Method-4:
Sudo su
→ cd dnsrecon
→ run Python3 dnsrecon.py -h [www.domain.com](http://www.domain.com/)
Method-5:
DNSenum is default tool installed in kali or parrot run the → dnsenum --enum www.domain.com