Reconnaissance and Scanning

Commands for gathering information about targets (ethical use only on systems you own or have permission to test).

• nmap

• Purpose: Scans networks for hosts, ports, and services.

• Example: nmap -sS 192.168.1.1 → Performs a stealth SYN scan.

• whois

• Purpose: Queries domain registration details.

• Example: whois google.com → Shows registrar and contact info.

• dig

• Purpose: Performs DNS lookups.

• Example: dig google.com A → Returns Google’s IP addresses.

• dnsenum

• Purpose: Enumerates DNS records for a domain.

• Example: dnsenum example.com → Lists subdomains and records.

• hping3

• Purpose: Sends custom packets for network testing (e.g., DoS simulation).

• Example: hping3 -S 192.168.1.1 -p 80 → SYN flood on port 80.