It was brought to my attention that the laboratory does not contain information on what you need to do. After trying to contact faculty services, I wasn’t able to get a hold of anyone that could discuss what needed to be done. As we are discussing footprinting and we have colleague, I have a few things that I would like you all to run.
Install whois on Kali. You may have issues if this is not part of the repository list. Use the following commands.
/etc/apt/sources.list
This will let you know your repository listing. Ensure that the repository listing has the following inside.
deb http://http.kali.org/kali kali-rolling main contrib non-free
Run the following commands in terminal.
apt-get update
apt-get upgrade
apt-get dist-upgrade
that should allow you to run the WHOIS installation command.
apt-get install whois
Run queries against domains.
whois caltech.edu
whois -h whois.networksolutions.com caltech.edu
whois -h whois.networksolutions.com *caltech.edu
whois -h whois.networksolutions.com .banjo
Run this against a few different websites. Copy the text from the terminal and store it into a file. Write a one-page summary for how this information could be used to attack a network.
Given the lateness of the hour, I will be giving a full week of extra time on this. Please accept my apologies. I will be working on the next lab to ensure that you guys have it out before it’s due. Thank you for your time and understanding regarding this.