0% found this document useful (0 votes)
18 views6 pages

Eh 1

The document outlines an experiment focused on using network reconnaissance tools such as WHOIS, dig, traceroute, and nslookup to gather information about networks and domain registrars. It details the aim, objectives, outcomes, and required hardware/software for the experiment, along with theoretical explanations of each tool's functionality. The learner is expected to understand and apply these tools for network analysis and problem-solving.

Uploaded by

Gayathri Kotti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

Eh 1

The document outlines an experiment focused on using network reconnaissance tools such as WHOIS, dig, traceroute, and nslookup to gather information about networks and domain registrars. It details the aim, objectives, outcomes, and required hardware/software for the experiment, along with theoretical explanations of each tool's functionality. The learner is expected to understand and apply these tools for network analysis and problem-solving.

Uploaded by

Gayathri Kotti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

21b01a1273

Network Threats and


AttacksLaboratory

Experiment No. : 1

Study the use of network


reconnaissance tools like WHOIS,
dig, traceroute, nslookup to gather
information about networks and
domain registrars.

1
Experiment No. 1
1. Aim: Study the use of network reconnaissance tools like WHOIS, dig, traceroute,
nslookup to gather information about networks and domain registers

2. Objectives: To know how to gather information about the networks by using different
n/w reconnaissance tools.

3. Outcomes: The learner will be able to:-

• Understand, identify, analyze and design the problem, implement the same
using current techniques, skills, and tools and validate the solution
including both hardware and software.
• Use network-based tools for network analysis.

4. Hardware / Software Required : WHOIS client

5. Theory:

1. Whois - whois searches for an object in a WHOIS database. WHOIS is a query and
response protocol that is widely used for querying databases that store the registered
users of an Internet resource, such as a domain name or an IP address block, but is
also used for a wider range of other information. Most modern versions of whois
try to guess the right server to ask for the specified object. If no guess can be made,
whois will connect to whois.networksolutions.com for NIC handles or
whois.arin.net for IPv4 addresses and network names.

Examples:

• Obtaining the domain WHOIS record for computersolutions.com


• WHOIS record by IP querying
• Querying WHOIS in google search engine

2
Output:

2. Dig - Dig is a networking tool that can query DNS servers for information. It can
be very helpful for diagnosing problems with domain pointing and is agood way
to verify that your configuration is working. The most basic way touse dig is to specify
the domain we wish to query: dig example.com

Output:

3. Traceroute - Traceroute prints the route that packets take to a network host.
Traceroute utility uses the TTL field in the IP header to achieve its operation. For
users who are new to TTL field, this field describes how much hops a particular
packet will take while traveling on network. So, this effectively outlines thelifetime
of the packet on network. This field is usually set to 32 or 64. Each time the
packet is held on an intermediate router, it decreases the TTL value by 1. When a
router finds the TTL value of 1 in a received packet then that packetis not
forwarded but instead discarded. After discarding the packet, router sends an

3
ICMP error message of ―Time exceeded‖ back to the source from where
packet generated. The ICMP packet that is sent back contains the IP address of the
router. So now it can be easily understood that traceroute operates by sending
packets with TTL value starting from 1 and then incrementing by one each time.
Each time a router receives the packet, it checks the TTL field, if TTL field is 1 then
it discards the packet and sends the ICMP error packetcontaining its IP address and
this is what traceroute requires. So traceroute incrementally fetches the IP of all the
routers between the source and the destination.

Example: traceroute example.com

traceroute to example.com (64.13.192.208), 64 hops max, 40 byte

packets 1 72.10.62.1 (72.10.62.1) 1.000 ms 0.739 ms 0.702 ms

2 10.101.248.1 (10.101.248.1) 0.683 ms 0.385 ms 0.315 ms

3 10.104.65.161 (10.104.65.161) 0.791 ms 0.703 ms 0.686 ms

4 10.104.65.161 (10.104.65.161) 0.791 ms 0.703 ms 0.686 ms

5 10.0.10.33 (10.0.10.33) 2.652 ms 2.260 ms 5.353 ms

6 acmkokeaig.gs01.gridserver.com (64.13.192.208) 3.384 ms 8.001 ms

2.439 ms
Output:

4. Nslookup - The nslookup command is used to query internet name servers interactively
for information. nslookup, which stands for "name server lookup", is a useful tool for
finding out information about a named domain. By default, nslookup will translate a domain
name to an IP address (or vice versa). For instance, to find out what\the IP address of
microsoft.com is, you could run the command:

nslookup microsoft.com
Server: 8.8.8.8

4
Address: 8.8.8.8#53
Non-authoritative
answer: Name:
microsoft.com
Address: 134.170.185.46
Name:
microsoft.com
Address: 134.170.188.221
Here, 8.8.8.8 is the address of our system's Domain Name Server. This is the server our system
is configured to use to translate domain names into IP addresses. "#53" indicates thatwe are
communicating with it on port 53, which is the standard port number domain name servers
use to accept queries. Below this, we have our lookup information formicrosoft.com.
Our name server returned two entries, 134.170.185.46 and 134.170.188.221. This indicates
that microsoft.com uses a round robin setup to distribute server load. When you
accessmicrsoft.com, you may be directed to either of these servers and your packets will be
routed to the correct destination.You can see that we have received a "Non- authoritative
answer" to our query. An answer is "authoritative" only if our DNS has the complete zone file
information for the domain in question. More often, our DNS will have a cache of
information representing the last authoritative answer it received when it madea similar
query, this information is passed on to you, but the server qualifies it as "non- authoritative":
the information was recently received from an authoritative source, but the DNS server is not
itself thatauthority.
Output:

5
Using nslookup to enumerate basic mx records

You might also like