Reconnaissance In Virtual Space 89
An anonymous reader writes "Whitedust Security have released an interesting article discussing online reconnaissance techniques. From the article: 'Sometimes thirty-two bits are all you need. This is a guide to Internet reconnaissance - a guide to finding out as much as you can concerning a target via the Internet'."
Virtual Space (Score:4, Funny)
Re: Virtual Space (Score:3, Funny)
Re:Let's mix some metaphors and roll! (Score:1)
Re:Let's mix some metaphors and roll! (Score:1)
Goodbye AMD (Score:5, Funny)
Well, there goes my need for AMD64.
Re:Goodbye AMD (Score:1, Offtopic)
Re:Goodbye AMD (Score:3, Informative)
The article is moronic and only discusses the ip-address, the easiest thing to hide if you really want to. I guess this would be a life-changing article if you don't know anything about networks, other than that, it's not worth the click.
32 bits is all you need... (Score:5, Funny)
Re:32 bits is all you need... (Score:1)
Using your personal website to pick up women (Score:5, Funny)
2) Look at who has been going to your website
3) If someone from a college you have a (hot girl) friend at visits your site, use facebook to see if the hit is from the dormroom they are in
4) If so, shoot them an email saying that you were thinking of them and asking how they are
5) Wait until they write back and say, "what a coincidence, I was thinking of you too!"
6) ????
7) Profit!
And the best thing is technically they're the one stalking you
(exercepted from an article to be published on kuro5hin in the mysterious future on using your personal website to get pick up women)
Re:Using your personal website to pick up women (Score:2)
Re:Using your personal website to pick up women (Score:2)
I should be charging (or perhaps getting charged) for this.
Re:Using your personal website to pick up women (Score:2)
Try software patents.
Oh, and the fame and fortune they (purportedly) bring... should help you with women, too.
Too bad by the time you get to use your "amazing discoveries" (made the hard way by using the "insights" from TFA [whitedust.net] -with anonymous<gasp>s
Re:Using your personal website to pick up women (Score:2)
Re:Using your personal website to pick up women (Score:3, Funny)
Re:Using your personal website to pick up women (Score:1)
1. <LeetGirl> joins a channel from a university computer
2. Get her username and host and ssh in to the same machine.
3. last | grep -i username | head -n 5
4. Check remote host for her connection; if it represents a machine in a computer classroom, hop in and say "hi" to start a conversation
And this would be reconnaissance? (Score:4, Informative)
How sad.
Re:And this would be reconnaissance? (Score:1)
Nothing - nothing! - to see here.
Re:And this would be reconnaissance? (Score:2)
Perhaps they could use such tools to run a whois on NBC.com. You know, to find out that they're owned and run by General Electric. The same General Electric who is invo
Re:And this would be reconnaissance? (Score:2)
finding out who owns the IP address of someone is near useless - it's the steps beyond that are the 'grey area' for most people. trying to get the attention of some random ISP in taiwan is going to be rather difficult at best, and completely useless for the most part.
Not sure what
Re:And this would be reconnaissance? (Score:2)
"Nerds" often have a high degree of understanding of one particular field. But that does not suggest that they're proficient in each and very topic. Somebody might be a supreme physics "nerd", yet know very little about basic networking utilities like whois or traceroute or nslookup. Likewise, a networki
Re:And this would be reconnaissance? (Score:2)
Re:And this would be reconnaissance? (Score:2)
https://addons.mozilla.org/extensions/moreinfo.ph
little content (Score:5, Insightful)
man nslookup
man whois
Try those commands for a more complete understanding of what's going on.
Reconnaissance!? (Score:5, Insightful)
Jeez, I was hoping for something vaguely Kevin Mitnick, and instead I get Sam Spade. [samspade.org] This may not be Intarweb 101, but it's maybe 102.
Who is/are Whitedust Security? (Score:5, Interesting)
Comment removed (Score:4, Insightful)
Re:Who is/are Whitedust Security? (Score:2)
Re:Who is/are Whitedust Security? (Score:1, Flamebait)
Re:Who is/are Whitedust Security? (Score:2)
Re:Who is/are Whitedust Security? (Score:4, Funny)
Re:Who is/are Whitedust Security? (Score:1)
Personify? (Score:2)
In context, I know what he means. But if I am trying to get a person's IP address, does that mean I'm trying to "computerfy" them?
DNS and whois? (Score:4, Informative)
1) You can use the DNS system to resolve IP addresses to hostnames, which may tell you something about the organisation they belong to.
2) For more information, perform a whois query.
That's news? Seriously, people, that's like saying that you can control your car with the help of this "steering wheel"...
Re:DNS and whois? (Score:1)
I KNEW I was doing something wrong!
Re:DNS and whois? (Score:1)
What a waste of time (Score:1, Informative)
TTL based routing analysis (traceroute), whois retrieval and plain DNS lookups, is that all? And not even a rundown of the nmap commandline, just nslookup(.exe) and tracert(.exe).
Where is all the other TTL based stuff like, oh I don`t know figuring out what packet filters ("firewalls" for the mysticism fans) are dropping [packetfactory.net] along the way? What about OS fingerprinting [insecure.org], simple googleing, what about DNS zone transfers, how about looking for published traffic graphs? How about simply connecting and letting someth
Re:What a waste of time (Score:2)
7 fred@ix ~ > tracert 68.57.30.45
bash: tracert: command not found
Junk article. (Score:2, Insightful)
"You can do a traceroute, a dns lookup, and read public whois data!"
Then this stuff about how IP addresses are broken up into "classes" to ease routing.. err, no, they aren't.. though they used to be many, many years ago.
Also... * * * in a traceroute may indicate ICMP filtering, but more often indicates that rfc1518 private addresses were used on the links, which are then blocked elsewhere. Perfectly normal, and quite common.
Re:Junk article. (Score:1)
Besides that, you are correct about this article being junk.
Oh, how perfect! (Score:3, Funny)
Dear Zonk (Score:1, Insightful)
Thank you.
Re:Dear Zonk (Score:2)
Nothing new - way old rehash. (Score:2)
It is nothing new [doxpara.com] or particularly insightful [schneier.com]. This does bring up 3 questions though
1 - Is the slashdot crowd so amazed by something so old as whois?
2 - How much will IP geolocation amaze then?
3 - Who let this even get posted?
Amazing Article... (Score:1)
WhiteDust...what a joke.
Re:This maybe a simple article (Score:1)
Um try 'anon coward' / 'anon spammer'. (Score:1)
stupid. (Score:1)
Ok, put your tips below; here are mine (Score:3, Informative)
1) probe port 80 on the last few addresses you find, and if you get a web page out of there, look at the page source to see if there are other IPs to look up. Nothing like a badly configured chain to cough some more info from. Probe for other common ports at the end of the chain to see if there's a mail server there; maybe you can make it cough more data.
2) do google or dogpile searches of the IP address, and both the dns names and reverse names; follow each hit until it ends somewhere. Always take notes.
3) try to find email addresses through index engines using the various domain names, and also its NS records, MX records and anything else in DNS that might point to hidden servers in the route(s). Take notes.
4) check various rbls, spamhaus, and so on to see if there are other complaints. Sometimes you can have fun.
5) check any phone numbers; search on those, too. Heaven loves a toll-free # in a spam.
And now, your tips?
For people who want high-tech, a fascinating book (Score:4, Informative)
To triangulate the source of spoofed IP packets, to (theoretically) sniff a keyboard by recording TCP sequence numbers, and even how to build a distributed computer out of covert channels, see Michal Zalewski's Silence On The Wire [barnesandnoble.com]. It's less practical than nslookup and whois but it's a glorious romp through the fun parts of information security. Read it for inspiration and to jar you into thinking outside the box.
(Disclosure: I got a free review copy.)
Whitedust? (Score:1)
Within six months of launch, the Whitedust Portal will overtake the existing portals as the leading source of comprehensive, trusted and unbiased security information. This will be achieved through a dedicated approach to reporting security events as they happen. So far in our live period Whitedust have placed an un-mistakable and firm emphasis on fair, unbiased and above all honest news comment on up to the minute security issues - a strategy fundamenta
A Request (Score:1)
Nevermind (Score:1)
Nmap? (Score:1)
Maybe next time, we'll get an Ethereal treat
Google (Score:1)
Up Your Gorilla (Score:2)
This might be news to my mom and dad. Well maybe not my dad, he has a clue.
Welcome to 5 years ago (Score:2, Insightful)
1. A practical guide to Internet reconnaissance.
Wrong. This isn't practical because it doesn't provide the investigator any useful information.
2. This is a guide to Internet reconnaissance - a guide to finding out as much as you can concernin
Wow (Score:1)
who is whitedust? (Score:1)
Maybe the Internet just arrived in Ireland... (Score:1)
A practical guide to Internet reconnaissance. (Score:1)
Well the net is a safer place than I thought.