Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
36

Video Transcription

00:01
Hi. Welcome back to the course in the last video we talked about Ennis, look up. When we use that to try to do a zone transfer again, I want to stress that we're just using a sample I p address and server in this lab. And so it's not set up for D. N S, and it's not gonna kick us back in the real results at all.
00:17
In this video, we're gonna talk about a tool called Dig. So we're gonna use that in Cali, Lennox, and we're gonna go ahead around a similar commanders We did before for the D. A s own transfer. But again, we're going to see the kind of output that we get.
00:29
So let's go ahead and get started. So make sure you're accessing the Windows 10 machine, which you should still be on if you're on the If you do the last lab and then double click on the PNC viewers so we can go ahead and launch our Kelly desktop.
00:40
So again, a default C I p address in there for us. We just click on Connect,
00:44
and then we're gonna talk in that password so it's going to pass word with a capital P. And that's a zero and not an oh so grand type that in so capital P
00:52
lower case A s s W the number zero lower case R D and then just click on. Okay, that'll launch our Callie virtual machine for us.
01:03
If you get that air message, just say okay to that. Now that we want to actually double clicking launched the route terminal window.
01:10
You see, it launches the terminal window there for us. So now, at the prompt, we're gonna enter this commence, we're gonna enter dig space, lower case a x fr. So that's basically used to provide a complete listing of the domain records
01:23
space than practice labs dot com. So remember, we're using a fictitious domain and then space and in the i p address of our target Deanna server or, in this case, our target server. Since it's not configured for Deanna's,
01:37
so go ahead and type that in here. So again, dig all over case space. Lower case a x fr
01:42
space. Lower case P r A C T I s C dash Labs base, and then our target machine one under 2.168
01:53
0.0 dot one and they just hit the enter key.
01:57
All right, so you see, obviously it gave us a failed transfer again because that certain transfers
02:04
Let's go back to our lab document here.
02:06
So question number one, what is dig stand for? So I kind of threw that in there for you. Now, if you go to the very top of the stock room, you'll see the answer. But I'm just gonna go ahead and tell you anyway. So dig stands for domain information, groper.
02:20
All right, So question number two, do you see any of his own information? So the answer to that one would be? No, because you see here that the zone transferred field so we don't really get any information back at all about it.
02:32
Okay, so this video, we just went over a tool called digging. We just went and ran a quick command
02:38
against our target machine to see
02:42
if there was any possibility that we could transfer zone information. In this case, it failed, obviously, because as machines not set up
02:49
as a d n a server
02:51
and the next video, we're gonna use a tool called PS Info

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor