tailieunhanh - Google hacking for penetration tester - part 22

Mỏ địa chỉ e-mail tại (không hiển thị trên các ảnh chụp màn hình) từ các địa chỉ e-mail, trích xuất các lĩnh vực (đã đề cập trước đó trong lĩnh vực khai thác mỏ và phần phụ-domain). | Google s Part in an Information Collection Framework Chapter 5 211 Figure Getting Data Center Geographical Locations Using Public Information Mine e-mail addresses at not shown on the screen shot From the e-mail addresses extract the domains mentioned earlier in the domain and sub-domain mining section . The results are the nodes at the top of the screen shot. From the sub-domains perform brute-force DNS look ups basically looking for common DNS names. This is the second layer of nodes in the screen shot. Add the DNS names of the MX records for each domain. Once that s done resolve all of the DNS names to IP is the third layer of nodes in the screen shot. From the IP addresses get the geographical locations which are the last layer of nodes. There are a couple of interesting things you can see from the screen shot. The first is the location South Africa which is linked to is because of the use of Akamai. The lookup goes like this 212 Chapter 5 Google s Part in an Information Collection Framework host is an alias for . is an alias for . has address has address As such the application sees the location of the IP as being in South Africa which it is. The application that shows these relations graphically as in the screen shot above is the Evolution Graphical User Interface GUI client that is also available at the Paterva Web site. The number of applications that can be built when linking data together with searching and other means are literally endless. Want to know who in your neighborhood is on Myspace Easy. Search for your telephone number omit the last 4 digits covered earlier and extract e-mail feed these e-mail addresses into MySpace as a person search and voila you are done You are only limited by your own .

TỪ KHÓA LIÊN QUAN