Question: Part I: Footprinting [Hints: dig, host, dnsenum, whois] 1. (2 points) Find the start of authority information for the domain name localhost. What command did
Part I: Footprinting [Hints: dig, host, dnsenum, whois] 1. (2 points) Find the start of authority information for the domain name localhost. What command did you use? SOA Information: Command: 2. (1 point) Find information about the www.smartmux.com domain Owner: Owner contact Information: How did you find it? 3. (2 points) Find information about the www.smartmux.com website. Not owners of the domain, but information about the network that hosts the website. What is the IP address of the webserver? How did you find it? What is the name of the organization that the IP address belongs to? What are the email address and names of the technical contact? How did you find this information? 4. (2 points) How can you use this information in a social engineering attack? 5. (1 point) Find what DNS server your Kali VM uses by using cat /etc/resolve.conf DNS server IP: 6. (2 points) Use dnsenum to enumerate www.smartmux.com using the IP address of SOA for that domain. Redirect output results to a file using >
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
