May 17, 2024, 2:28 p.m. | David Eduardo Karpinski

System Weakness - Medium systemweakness.com

Hi everyone, everything fine?

After the article on Information Gathering with OSINT, it’s time for Network Infrastructure Recon.

Domain Information Gathering

One of the most used tools for this activity is whois. There are several web-based services:

You can also use it from the command line.

whois <domain>

Reverse DNS Lookup

Another interesting Footprinting technique is reverse DNS — enumerating domains that point to the same IP address that are related to each other or not (shared hosting).

DNS …

bug bounty cybersecurity dns hacking networking

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)