B75 CSS Exp 7
B75 CSS Exp 7
: VI
PART A
(PART A : TO BE REFFERED BY STUDENTS)
Experiment No.07
A.1 Aim: Study the use of network reconnaissance tools like WHOIS, dig, traceroute, nslookup
to gather information about networks and domain registrars.
A.2 Prerequisite:
1. Basic Knowledge of IP addresses, DNS.
A.3 Outcome:
After successful completion of this experiment students will be able to
A.4 Theory:
Network Reconnaissance:
• Act of reconnoitoring ---explore with the goal of finding something(especially to
gain information about enemy)
• In the world of hacking, reconnaisance begins with “Footprinting”
• i.e accumulating data about target’s environment, and finding vulnerabilities.
• Attacker gathers information in two phases viz: passive attacks and active attacks
Passive attacks
• Gathering information about a target without his/her knowledge….Eavesdropping
• Yahoo or google search
• Surfing online community groups
• Gathering information from websites of organisations. e.g. contact details, email
address etc.
• Blogs, newsgroups, press releases etc.
• Going through job posting in particular job profiles
Reconnaissance Tools
MarkMonitor.com reserves the right to modify these terms at any time. By submitting this
query, you agree to abide by this policy.
Example:
$ dig duckduckgo.com
3. Traceroute - traceroute prints the route that packets take to a network host.
Traceroute utility uses the TTL field in the IP header to achieve its operation.
For users who are new to TTL field, this field describes how much hops a
particular packet will take while traveling on network. So, this effectively
outlines the lifetime of the packet on network. This field is usually set to 32 or
64. Each time the packet is held on an intermediate router, it decreases the
TTL value by 1. When a router finds the TTL value of 1 in a received packet
then that packet is not forwarded but instead discarded. After discarding the
packet, router sends an ICMP error message of ―Time exceeded‖ back to the
source from where packet generated. The ICMP packet that is sent back
contains the IP address of the router. So now it can be easily understood that
traceroute operates by sending packets with TTL value starting from 1 and
then incrementing by one each time. Each time a router receives the packet, it
checks the TTL field, if TTL field is 1 then it discards the packet and sends the
ICMP error packet containing its IP address and this is what traceroute
requires. So traceroute incrementally fetches the IP of all the routers between
the source and the destination.
nslookup
Dig
Dig
Dig google.com
Whois
Traceroute is a network diagnostic tool used to track in real-time the pathway taken
by a packet on an IP network from source to destination, reporting the IP addresses of
all the routers it pinged in between. Traceroute also records the time taken for each hop
the packet makes during its route to the destination.
Dig will let you perform any valid DNS query, the most common of which are:
A (the IP address), TXT
(text annotations),
4. After using traceroute how attacker can use the information, based on the same
what kind of attacks can be applied.
Ans:-
An adversary uses a traceroute utility to map out the route which data flows through the
network in route to a target destination. Tracerouting can allow the adversary to construct a
working topology of systems and routers by listing the systems through which data passes through
on their way to the targeted machine. This attack can return varied results depending upon the
type of traceroute that is performed. Traceroute works by sending packets to a target while
incrementing the Time-to-Live field in the packet header. As the packet traverses each hop along
its way to the destination, its TTL expires generating an ICMP diagnostic message that identifies
where the packet expired. Traditional techniques for tracerouting involved the use of ICMP and
UDP, but as more firewalls began to filter ingress ICMP, methods of traceroute using TCP were
developed.