27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

nmap -sP 192.168.124.0/24<br />

Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-05-18 20:26<br />

CEST<br />

Host 192.168.124.1 appears to be up.<br />

Host 192.168.124.2 appears to be up.<br />

Host 192.168.124.10 appears to be up.<br />

Host 192.168.124.12 appears to be up.<br />

Host 192.168.124.15 appears to be up.<br />

Host Dantes (192.168.124.20) appears to be up.<br />

Nmap run completed -- 256 IP addresses (6 hosts up) scanned in 7.195<br />

seconds<br />

Graphic utilities can be used to do the same type <strong>of</strong> operation:<br />

What's up gold:<br />

B) Zone Transfer<br />

All domains are associated to a DNS server, hosted either on the network itself, or externally. The role<br />

<strong>of</strong> this service is to send back to a client an IP address associated with a host name. The zone transfer<br />

asks the DNS server to list all entries related to a specific domain. This is generally used by secondary<br />

name servers to update their entries. If the consultation <strong>of</strong> these entries is not limited to the secondary<br />

server, a hacker can list a domain's entries. The network can then be mapped, without the intruder<br />

having to independently ping each machine.<br />

The nslookup utility, present on both Linux and Windows, can carry out this operation.<br />

The <strong>Hack</strong>ademy DMP -27/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!