Domain names and IP addresses are excellent starting points for gathering intelligence about the true owner of a system. In this video, Mike Chapple explains the use of the nslookup, dig, and whois utilities.
- [Instructor] Domain names and IP addresses…are excellent starting points for gathering intelligence…about the true owner of a system.…Let's take a look at a few of the utilities…that can help you learn more about a remote system.…The first thing we'll do is try to learn more…about the hosts behind a domain name.…You already know that the Domain Name Service, or DNS,…translates domain names into IP addresses.…Did you know that you can perform these lookups manually…to find out the IP addresses associated with a domain name?…The "dig" command is the primary tool…for performing domain lookups on Mac and Linux systems.…
Let's take a look at dig in action.…Suppose I want to know the IP address for lynda.com.…I can simply type in dig, space, lynda.com.…And then I very quickly get back results.…I can see in the question section…that the question I asked was, "lynda.com",…so I'm asking, "What's the IP address for lynda.com?",…and the answer that I received back…is that lynda.com's IP address…is 22.214.171.124.…That query took about six milliseconds…
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.