Intelligence with geo2ip and reverse-whois
The reconnaissance of the company’s network resources mainly consists in brute-force subdomains with the subsequent resolution of the found network blocks. Then new level 2 domains can be found and the procedure is repeated again. This allows new IP addresses to be found at each iteration.
This method is perhaps the most effective. However, there were situations where the whole / 24 subnet was not found.
Nowadays, another powerful tool has appeared – passive dns, which allows you to do the same as a classic DNS resolution, but using a special API. This can be, for example, “virustotal” or “passive-total”. These services record DNS requests and responses that are collected from popular DNS servers. The advantage of this approach is that we don’t need brute force. We just enter the IP address and get all known DNS records. Or, conversely, by specifying DNS, we get all the IP addresses that are associated with this name. This approach has an undeniable advantage – we can find old site servers that were resolved earlier. After all, older sites are more likely to contain vulnerabilities.
Despite the techniques described above, there are still several slightly less popular, but still giving results. In this article, we will look at two more intelligence techniques – looking up IP addresses by geographic data (geo2ip) and finding IP addresses by company name (reverse-whois).
Newest
- The Importance of Encryption in Protecting Corporate Data
- Microsoft Technologies in Healthcare: New Opportunities
- Comprehensive Guide to Upgrading Terraform Versions
- Staying Warm in the Backcountry: Top Sitka Pieces for Canadian Expeditions
- Innovations in Sports Betting: The Role of Technology in 2023
About
Man is what he consumes. This statement in the modern world now applies not only to food. Man is alive thanks not only to his daily bread. Every day we consume gigabytes of information, in one day we process it as much as in the Middle Ages people did not receive in their entire life. We just woke up and immediately check e-mail notifications, while we have breakfast, scroll through the feed on VKontakte or any other social network, in our free time we watch videos on YouTube, etc. etc. By these actions, we not only consume, but also create information. Each of our steps on the Internet, any of our clicks, all movements from site to site are recorded and recorded. This is called the user’s social data. It is they who make up our virtual personality. And this personality of ours has its own price, for which they are willing to pay big money.