3.33 Enumeration Tools Lab Instructions Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

19 hours 55 minutes
Video Transcription
Hi. Welcome back to the course in the last video we talked about Ennis, look up. When we use that to try to do a zone transfer again, I want to stress that we're just using a sample I p address and server in this lab. And so it's not set up for D. N S, and it's not gonna kick us back in the real results at all.
In this video, we're gonna talk about a tool called Dig. So we're gonna use that in Cali, Lennox, and we're gonna go ahead around a similar commanders We did before for the D. A s own transfer. But again, we're going to see the kind of output that we get.
So let's go ahead and get started. So make sure you're accessing the Windows 10 machine, which you should still be on if you're on the If you do the last lab and then double click on the PNC viewers so we can go ahead and launch our Kelly desktop.
So again, a default C I p address in there for us. We just click on Connect,
and then we're gonna talk in that password so it's going to pass word with a capital P. And that's a zero and not an oh so grand type that in so capital P
lower case A s s W the number zero lower case R D and then just click on. Okay, that'll launch our Callie virtual machine for us.
If you get that air message, just say okay to that. Now that we want to actually double clicking launched the route terminal window.
You see, it launches the terminal window there for us. So now, at the prompt, we're gonna enter this commence, we're gonna enter dig space, lower case a x fr. So that's basically used to provide a complete listing of the domain records
space than practice labs dot com. So remember, we're using a fictitious domain and then space and in the i p address of our target Deanna server or, in this case, our target server. Since it's not configured for Deanna's,
so go ahead and type that in here. So again, dig all over case space. Lower case a x fr
space. Lower case P r A C T I s C dash Labs base, and then our target machine one under 2.168
0.0 dot one and they just hit the enter key.
All right, so you see, obviously it gave us a failed transfer again because that certain transfers
Let's go back to our lab document here.
So question number one, what is dig stand for? So I kind of threw that in there for you. Now, if you go to the very top of the stock room, you'll see the answer. But I'm just gonna go ahead and tell you anyway. So dig stands for domain information, groper.
All right, So question number two, do you see any of his own information? So the answer to that one would be? No, because you see here that the zone transferred field so we don't really get any information back at all about it.
Okay, so this video, we just went over a tool called digging. We just went and ran a quick command
against our target machine to see
if there was any possibility that we could transfer zone information. In this case, it failed, obviously, because as machines not set up
as a d n a server
and the next video, we're gonna use a tool called PS Info
Up Next
Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By