Network Enumeration with Maltego

A free video tutorial from Packt Publishing
Tech Knowledge in Motion
Rating: 3.9 out of 5Instructor rating
1,262 courses
401,208 students
Network Enumeration with Maltego

Lecture description

Information gathering / an all-in-one translation tool (Maltego)

Learn more from the full course

Kali Linux - Backtrack Evolved

Assuring Security by Penetration Testing

02:43:30 of on-demand video • Updated September 2014

Many advanced techniques are addressed within this series, but it is still designed to simultaneously accommodate less experienced viewers. The series provides detailed explanations intended to clearly address the underlying processes involved with all tasks performed.
English [Auto]
You is one of the most comprehensive information gathering tools in Cali in order to access it. Just type multi-game from the command line. Multi-hour works by using whatever information the user has about a target network as a foothold to gather more information about the target. It uses a technique called transforms to gather new information using information that is already a start by selecting new up in the top left corner. And different types of information gathering are separated into different palettes to include devices infrastructure locations pin testing personal and social network devices infrastructure and locations can be helpful for gathering information about a target company or organization personal and social network can be used for gathering information on specific individuals within an organization for social engineering purposes and penetration testing integrates several pin testing tools into the multi-game platform. We're going to start with infrastructure. So go ahead and expand that and then drag DNS name over to the center screen by default that loads the manufacturer's server Alpina Pentair. Hum we can change this name and performed information gathering on any target by entering the property view. But for now we'll just go ahead and go with the manufacturer's server to perform the demonstration. So we'll start by resolving that server back to the parent domain. So right click it and then run transform then convert to domain and then to domain and it immediately resolves the Alpines server back to perturb the dot com and then we can use that for gathering information about that domain. So we'll start with gathering iMac servers or mail servers and then DNS from domain and we'll gather names servers then we'll gather different hosts by using common domain names. And as you can see within a few seconds we've already gathered a whole bunch of information about this domain and enumerated numerous different systems to include mail servers name servers and different host systems. There's still a lot of information that can be gathered from the parent domain. But in addition to running transforms on it we can also run transforms on all the objects that were created as a result of previous inquiries. This allows us to use a point and click approach to continue to yield more and more useful information. Here we've just gathered the IP address of a particular host that was previously collected. We can also organize this information with different views that allow us to see different relations of different systems to each other. We can also select from main view bubble's you or entity list which will give us information about each of the different objects that have been discovered. So that's just one example of how you can use multimode to gather information for penetration testing with Carly.