Footprinting and Reconnaissance - singirikondamani/Noted GitHub Wiki

Gathering the information of the website any information like geolocation, DNS any etc.

Use the Tool : BillCpiher

Commands:

  1. Step: Sudo sucd BillCipherrun Python3 billcipher.py
  2. Step: Select the option from the list according to task.
  3. Step: Enter the target website and IP address (get the IP of the target domain).
  4. Step: Enter to run the tool and get the output and analysis and get the answer.

image

To check any domain or IP DNS zone transfer enabled or disabled use the below method

Use the Tools : DIG, BillCipher,DNSEnum,DNSRecon

Method-1:

  1. Step: Sudo sucd BillCipherrun Python3 billcipher.py
  2. Step: Select the option from the list according to task.
  3. Step: Enter the target website and IP address (get the IP of the target domain).
  4. Step: Enter to run the tool and get the output and analysis and get the answer.

Method-2:

  1. Step: dig the domain name name server → dig ns <domain name>
  2. Step: after obtained the name server for from above command run zone transfer and check → dig axfr @name.server/ip <domain name>
  3. Step: Analyze the answer if the output shows the fail to zone transfer answer accordinging.
  4. To Identify the name server Using the dig tool → dig ns <domain name>

Method-4:

Sudo sucd dnsrecon run Python3 dnsrecon.py -h [www.domain.com](http://www.domain.com/) image

Method-5:

DNSenum is default tool installed in kali or parrot run the → dnsenum --enum www.domain.com