Kali Linux is a powerful platform for ethical hacking and penetration testing. Among its arsenal, information gathering tools play a crucial role in identifying potential vulnerabilities in a network. In this article, we will explore some of the most effective tools, including NMAP, ZenMAP, Searchsploit, DNS tools, LBD tools, and Hping3.
NMAP and ZenMAP
NMAP (Network Mapper) is a versatile and free utility used for network discovery and security auditing. It provides essential information such as available hosts, services offered, operating system versions, and firewall details. ZenMAP, a GUI version of NMAP, simplifies these tasks with an intuitive interface.
How to Use NMAP
- Open NMAP:
Applications → 01-Information Gathering → nmap
- Detect the OS type/version of the target host:
nmap -O 192.168.1.101
- Scan all TCP ports:
nmap -p 1-65535 -T4 192.168.1.101
Stealth Scan
The stealth scan (SYN scan) performs a half-open scan to detect listening ports without completing the TCP handshake:
nmap -sS -T4 192.168.1.101
Searchsploit
Searchsploit allows users to search the Exploit Database archive directly from the command line. This is particularly useful for identifying vulnerabilities.
How to Use Searchsploit
- Open Searchsploit:
Applications → 08-Exploitation Tools → searchsploit
- Type the following command:
searchsploit exploit index name
DNS Tools
DNS tools in Kali Linux help in performing zone transfers, domain IP resolving, and more.
dnsenum.pl
This PERL script retrieves records such as MX and A:
dnsenum domainname
DNSMAP
DNSMAP discovers subdomains and other connected information:
dnsmap domainname
dnstracer
Determines the source of DNS information for a hostname:
dnstracer domainname
LBD Tools
The Load Balancing Detector (LBD) tool identifies domains utilizing DNS or HTTP load balancing. This can help identify inconsistencies across servers.
How to Use LBD Tools
lbd domainname
Hping3
Hping3 is a packet crafting tool that simulates network traffic and bypasses firewall filters. It supports protocols like TCP, UDP, ICMP, and RAW-IP.
How to Use Hping3
- View available commands:
hping3 -h
- Run the command:
hping3 domain_or_IP -parameter
Conclusion
Kali Linux offers a comprehensive set of tools for information gathering, making it an indispensable resource for ethical hackers and security professionals. By mastering tools like NMAP, ZenMAP, Searchsploit, DNS tools, LBD tools, and Hping3, users can perform effective reconnaissance and enhance their network security assessments.
0 Comments