Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:02
I welcome back to the course. In the last video, we wrapped up our discussion on banner grabbing
00:07
and this video We're gonna talk about different enumeration tools. So we're gonna go over things like in its look up dig PS info and finger. Now a couple of ominous look up and dig. We're gonna try his own transfers, Dunson transfer. So I want to stress that we're just doing the concept here, and it's not gonna actually spit back any information for us,
00:26
since the target's river were using is not actually set up as a dina server. So
00:31
just keep that in mind that we're going over the concepts and kind of the muscle memory, so to speak, of what you would do if you were trying to do a d. N s own transfer.
00:40
So let's get started. So just go ahead and make sure you loved into the cyber relapse, and you've chosen the ethical hacker practice labs on, Then next selectee using enumeration tools lab and then click the star. But that's gonna launch youto where we're at right now.
00:54
Go ahead and turn on all your virtual machines
00:57
and then connect to the windows 10 machines. So I'm already connected to in this P lab Win 10.
01:03
Our next step years, we're gonna click a scheming right click on the start menu, and we're gonna search and we're gonna search for ah cmd. But once we start searching for, it's actually gonna pull it up for us. So we'll scroll down to our start menu, right click. We're gonna go to Search. And then basically, as soon as we start type in CM, it's gonna pull up the command prompt force. We just go ahead and click on that.
01:23
It'll launch that window for us.
01:26
All right, so we're way down here, so the command prompt is opened,
01:29
and now we're gonna type Ennis, look up. And when we do that, what you're going to notice is that we're gonna get the greater than symbol so you'll see the prompt right now, it's kind of that underscore on. And then it's gonna change to a greater than symbol. So let's go ahead and just type in and it's look up and then hit. Enter
01:45
and you'll see right here in just a second is gonna show that greater than simple.
01:49
All right, let's go back to our lab document here.
01:52
So now we need to type in the i p address of our servers. So server, and then we're going to specify the i P address. So let's come back here. We're gonna type in server space 1 92.168 dot 0.1
02:05
and then just press enter.
02:07
Okay?
02:08
So now our next step is we're gonna type in set type, equals any so
02:14
set
02:15
space type
02:17
equals and any altogether, and then disperse center again.
02:23
Now, we're not actually getting anything really spit back out yet from from the machine, simply because it's not set up as a d n a server. So just again. Keep that in mind.
02:30
I'm gonna scroll down here. So you see, nothing's happening there. We're gonna go in, type our last command in there as well. So we're not We're not gonna get the output that we're looking for. Your This particular thing, however, were able to just kind of go through that muscle memory like I mentioned.
02:46
All right, so what's through? A touch of sense where it happened? L s
02:51
space dash, lower case D space practice. So with an s dash labs dot com
02:59
Now, that's obviously a fictitious domain. So it's gonna give us ah, failure. Essentially what? It won't give us any information, so l s space dash d
03:08
face crack t's so misspelling there.
03:14
Death
03:15
labs
03:16
dot com
03:17
So
03:20
l s Space Dash Lower case D space practiced. Dash labs dot com
03:25
Now they're just gonna hit enter. So of course the number one there is Do you see any
03:31
zone transfer information at all
03:35
and you'll see here that nothing is actually happening at all for us.
03:38
So we hit command. There you go, See? So finally is gonna kick back that it's a non existent domain which we already knew on. Then it also mentions and tells us that the D A knows server refused to transfer the zone to the computer. That's something because number one that's fictitious and number two because we're
03:54
using this I p address for this server that's not set up for D. N s.
03:59
So the next video, we're gonna go ahead and go over the dig command into a similar thing. And this video we talked about N s look up, which is another command that could be used for Deanna Stone transfers

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Leo Dregier
Instructor