Difference between revisions of "Information Gathering Tools"
VHorvathova (talk | contribs) |
VHorvathova (talk | contribs) |
||
Line 25: | Line 25: | ||
23/tcp open | 23/tcp open | ||
Portscan Finished: Scanned 150 ports, 148 ports were in state closed | Portscan Finished: Scanned 150 ports, 148 ports were in state closed | ||
Nmap: | |||
Nmap scan report for 192.168.0.130 | Nmap scan report for 192.168.0.130 | ||
Host is up (0.20s latency). | Host is up (0.20s latency). |
Revision as of 07:13, 19 June 2021
Summary
This is a draft. Comparing various available information gathering tools in Kali and comparing differences to ParrotOS
Requirements
- Operating system: Kali Linux 2021.1 amd64, Parrot Security 4.10 amd64
Disclaimer: all possible examples and tests done have been done in VMWare in a Kali Linux and ParrotOS VM.
Tools
Spiderfoot
Legion
DMitry
DMitry is a CLI to gather information about a host - possible subdomains, uptime information, tcp port scan, email addresses, whois lookups etc. It is mostly used to reveal information that exists through search engines about the owner or host of a web page, i.e. for social engineering attacks.
When using the portscan option, the results show less open ports than doing that same TCP scan with nmap.
DMitry:
HostIP:192.168.0.130 HostName: Gathered TCP Port information for 192.168.0.130 Port State 23/tcp open Portscan Finished: Scanned 150 ports, 148 ports were in state closed
Nmap:
Nmap scan report for 192.168.0.130 Host is up (0.20s latency). Not shown: 996 closed ports PORT STATE SERVICE 23/tcp open telnet 554/tcp open rtsp 843/tcp open unknown 5001/tcp open commplex-link MAC Address: 7C:DD:90:AF:4E:7D (Shenzhen Ogemray Technology) Nmap done: 1 IP address (1 host up) scanned in 2.33 seconds
To perform a whois lookup, you need either the IP or the domain same.
Nmap
Recon-ng
Maltego
Netdiscover
Ike-scan
What's different in ParrotOS?
Used Hardware
Device to be used with this documentation Maybe another device to be used with this documentation
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)