This was really a helpful room by TryHackMe. Here I learned about Active, Passive Reconnaissance, Whois records, Nslookup, dig, DNSdumpster and Shodan.
Ashmit Sharma’s Post
More Relevant Posts
-
I have completed the Passive Reconnaissance room in Tryhackme. In this room, I learned on passive reconnaissance, discovering command-line tools such as whois, nslookup, and dig. It also covered two publicly available services DNSDumpster and Shodan.io. Using these tools one can collect information about targets without directly connecting to them, discovering a trove of information.
To view or add a comment, sign in
-
Done new roon from TryHackMe which called Passive Reconnaissance In this room, we focused on passive reconnaissance. In particular, we covered command-line tools, whois, nslookup, and dig. We also discussed two publicly available services DNSDumpster and Shodan.io. The power of such tools is that you can collect information about your targets without directly connecting to them. Moreover, the trove of information you may find using such tools can be massive once you master the search options and get used to reading the results. #tryhackme #passivereconnaissance #reconnaissance #dig #nslookup #dnsdumpster #shodan #whois #mosta #0xMOSTA
To view or add a comment, sign in
-
Reconnaissance - The first time I read this, I was like what does this mean, its not so easy to remember this word or even to pronounce it. But this simply means "Exploration to gain Information". In #CyberSecurity we have Active and Passive Reconnaissance. Passive reconnaissance is done without directly interacting with the target using OSINT and other tools like nslookup, whois, dig, dnsdumpster, shodan.io and so on. Active reconnaissance is when you make a direct contact with your target to gain more information either using social engineering techniques or using tools like ping, tracert, nmap ...
To view or add a comment, sign in
-
Passive Reconnaissance: Completed TryHackMe Module 🎯
To view or add a comment, sign in
-
🔍 Exploring Passive Reconnaissance: TryHackMe Lab Completion 🔍 I recently completed the Passive Reconnaissance room on TryHackMe, where I learned basic techniques to gather information about a target discreetly. 1. Passive vs. Active Reconnaissance Passive Reconnaissance: - Involves gathering information without interacting directly with the target. - Techniques include analyzing publicly available data such as WHOIS records and online databases. - Helps avoid detection during the reconnaissance phase. Active Reconnaissance: - Involves directly probing the target, such as port scanning or sending ICMP requests. - More likely to alert the target due to direct interaction. 2. WHOIS Lookup - Learned how WHOIS queries retrieve domain ownership and registration information. - Extracted details like the registrant's name, contact information, and hosting provider. - Understood how this information helps build a profile of the target organization. 3. NSLookup and Dig - Used NSLookup to query DNS servers for specific records such as A, MX, and CNAME. - Practiced using Dig for more detailed DNS analysis, including authoritative name server information. - Identified key IP addresses and domain configurations for reconnaissance purposes. 4. DNSDumpster - Explored DNSDumpster as a tool for visualizing DNS data. - Mapped subdomains, email servers, and DNS records of a target domain. - Learned how to analyze the information for potential vulnerabilities. 5. Shodan.io - Leveraged Shodan.io, a search engine for internet-connected devices. - Discovered exposed services, open ports, and device configurations. - Understood how attackers could exploit improperly secured systems found on Shodan. This lab was essential for developing passive reconnaissance skills, helping me understand how to gather valuable information without detection. Such techniques are crucial for ethical hacking and penetration testing. #CyberSecurity #PassiveReconnaissance #TryHackMe #EthicalHacking #DNSAnalysis #InfoSec
To view or add a comment, sign in
-
Just finished the Passive Reconnaissance room on TryHackMe! 🚀 Learned some awesome techniques for gathering information without directly engaging with the target. 🕵️♂️ 🖊 Explore WHOIS records using the whois command-line utility. 🖊 Used nslookup and dig to query DNS server. 🖊 Discovered online services like DNS Dumpster and Shodan for passive reconnaissance. 🎉🎉🎉🎉🎉🎉🎉🎉🎉
To view or add a comment, sign in
-
🚀🚀Just Completed the Passive-Reconnaissance module on TryHackMe! I've heard many statements on buildingup strong base on reconnaissance techniques and grinding over OSINT. Finally, this is the first recon stay updated more yet to come!! 👨💻Enhanced my skills in:🔰Information gathering through shodan. 🔰 Better usage of SearchEngines.🔰 Deep-Dive in IP concepts. ✅️Getting ready to apply these skills in real-world scenarios and continue learning! #Cybersecurity #redteam #Reconnaissance#TryHackMe https://lnkd.in/gjhBG9W2
To view or add a comment, sign in
-
Learned the difference between active and passive reconnaissance in cyber.
To view or add a comment, sign in
-
🚀 Milestone Achieved! 🚀 I’m excited to announce that I’ve just completed the 𝐏𝐚𝐬𝐬𝐢𝐯𝐞 𝐑𝐞𝐜𝐨𝐧𝐧𝐚𝐢𝐬𝐬𝐚𝐧𝐜𝐞 room on TryHackMe! 🎉🔍 This room was an in-depth exploration of techniques for gathering information without actively engaging with the target systems. From uncovering valuable data through public sources to mastering the art of 𝐎𝐒𝐈𝐍𝐓 (𝐎𝐩𝐞𝐧 𝐒𝐨𝐮𝐫𝐜𝐞 𝐈𝐧𝐭𝐞𝐥𝐥𝐢𝐠𝐞𝐧𝐜𝐞), this experience has sharpened my skills in strategic data collection and analysis. Here’s to continuous learning 🚀 #TryHackMe #CyberSecurity #OSINT #PassiveReconnaissance #EthicalHacking #ContinuousLearning #Infosec #ProfessionalDevelopment
To view or add a comment, sign in