Table of Contents
Passive scanning is the act of gathering information on your target without engaging with the machine directly. This allows you to conduct research without alerting your target.
NSLookup
You can find what IP a domain name resolves to by using nslookup
:
nslookup google.comServer: 192.168.2.2Address: 192.168.2.2#53Non-authoritative answer:Name: google.comAddress: 172.217.5.238dfName: google.comAddress: 2607:f8b0:4004:810::200e
The above output shows google.com
's IPv4
and IPv6
address.
Shodan
You can use Shodan to gather information based on an IP. Using the example above, we can see additional information for google.com
here:
- Country
- Organization
- Internet service provider
- Contact information
- Ports open
- Services running
If you have a Shodan API key, you can use the CLI tool by running shodan init [API_key]
and use the following:
shodan host 172.217.5.238
Shodan is a powerful tool that can be used to expplore the internet for specific devices such as open webcams and telnet logins with the password "1234"
Searchsploit
Once you have information about your target (wether through active scanning or means outlined above), you can use searchsploit
for known vulnerabilities:
searchsploit [options] [term(s)]
Useful Options
-c
: case sensitive (default: case insensitive)-e
: enforces exact match on term order (default: terms ANDed disregarding order)-s
: enforces strict matching, disabling fuzzy matching--exclude"term1|term2"
: exclude provided terms from search results--nmap [output.xml]
: uses annmap
XML report as input (use-oX
or-oA
flag innmap
)
Updating Searchsploit
Searchsploit is backed by ExploitDB. To ensure you have the latest exploit database you can run searchsploit -u