Ku soo dhowow Heerka 2aad!
Tallaabada ugu horeysa ee pen testing-ka waxay tahay Information Gathering — soo uruurinta macluumaadka bartilmaameedka aad baareyso. Casharkaan wuxuu kugu barin doonaa sida loo baaro domain-ka, soo helo email-yada, iyo sida Google Dorking loogu isticmaalo siinbaaristaan.
📌 Waxaad baranaysaa: WHOIS, DNS tools, theHarvester, Shodan, Google Dorking, iyo Wayback Machine.
⚖️ Ogeysiis: Casharkaan waxaa loogu talagalay baaritaanka ansaxa ah. Ku isticmaal domain-kaaga ama aad fasax u leedahay oo keliya.
1. Noocyada Information Gathering
Information Gathering waxay leedahay laba hab:
- Passive (Qareen): Soo ururi macluumaad adoon toos ula xidhin nidaamka bartilmaameedka. Waxaad isticmaashaa internet, databases, iyo tools-ka online.
- Active (Furan): Toos ula xidh nidaamka — ping, scanning, iwm. Waxay sidaan si cad u muujinaysaa weerar.
Pen testers-ka badankoodu waxay bilaabaan qareen (passive) ka dibna u gudubaan furan.
2. WHOIS — Macluumaadka Domain
WHOIS waa adeeg aad kaga heli karto macluumaadka diiwaan-gelinta domain-ka: cidda milkiilaysa, cinwaanka, taariikhda soo dhammaanaysa, iyo nameservers-ka.
# Terminal-ka ku dir
whois google.com
whois amazon.com
whois 8.8.8.8 # Waxaad WHOIS ku samaysan kartaa IP-ga sidoo kale
# Online: whois.domaintools.com ama who.is
# Macluumaadka muhiimka ah ee la fiiriyo:
# Registrant Name — Cidda milkiilaysa
# Registrant Email — Email-ka diiwaangelinta
# Name Servers — DNS servers
# Created/Expires — Taariikhaha
3. DNS Recon — Baaris DNS-ka
# Aasaasiga (dig)
dig google.com # A record (IPv4)
dig google.com AAAA # IPv6
dig google.com MX # Mail servers
dig google.com NS # Name servers
dig google.com TXT # Text records (SPF, DKIM, etc.)
# Muuji dhammaan xogta
dig google.com ANY
# Reverse DNS — IP u bedel Domain
dig -x 8.8.8.8
# nslookup (dhammaan nidaamyada)
nslookup google.com
nslookup -type=MX google.com
# dnsrecon (Kali Linux — tool xirfad leh)
dnsrecon -d google.com
4. theHarvester — Soo Ururi Email & Subdomain
theHarvester waa tool Kali Linux ku jirta oo aad kaga helaysid email-yada, domains, iyo hosts-ka xidid domain-ka.
# Ku rakib (haddaanba ku jirin)
sudo apt install theharvester
# Isticmaal
theHarvester -d example.com -b google
theHarvester -d example.com -b bing,linkedin
theHarvester -d example.com -b all -l 500
# Xulashada -b waxay tilmaamaysaa isha:
# google, bing, yahoo, linkedin, twitter, shodan, etc.
# Waxaad ka helaysaa:
# - Email-yada
# - Subdomains-ka
# - IP addresses
# - Hosts-ka
5. Shodan — Internetka Xogta
Shodan waa raadiye khaas ah oo u raadinaya qalabka ku xidha internet (routers, cameras, servers, IoT devices). Xirfadlayaasha cybersecurity waxay u isticmaalaan si ay u helaan nidaamyada furan.
# Website: shodan.io (ballan-qoosasho bilaash/lacag ah)
# Raadinta Shodan website-ka:
apache country:SO # Apache servers Soomaaliya
port:22 country:US # SSH servers Maraykanka
webcam has_screenshot:true # Cameras internet ku xidha
default password # Nidaamyada password-ka hore
# CLI (haddaad account leedahay):
shodan init YOUR_API_KEY
shodan search "apache" --limit 10
shodan host 8.8.8.8 # Xog ku saabsan IP gaar ah
6. Google Dorking — Baaris Heer Sare
Google Dorking waa hab lagu isticmaalo heerarka raadinta Google si aad u hesho macluumaad gaar ah oo aan si caadi ah loo arkin.
# Operators-ka Aasaasiga
site:example.com # Raadi site gaar ah oo keliya
filetype:pdf site:example.com # PDF-yada site gaar
intitle:"index of" # Directory listings furan
inurl:admin # URLs leh "admin"
inurl:login # Login pages
inurl:wp-admin # WordPress admin pages
# Dorks Xirfad leh
site:example.com filetype:sql # SQL files (database!)
site:example.com inurl:config # Config files
intitle:"index of" "passwords" # Password files furan
inurl:"/admin/login" # Admin logins
# Raadi warbixin khaas
"@example.com" site:linkedin.com # Employees email-yada
# MUHIIM: Ku isticmaal si ansax ah
# Google Dorking naftiisa waa halal, laakiin waxaad ka helaysid
# waxaa loo isticmaali karo si xun — raac sharciga
7. Wayback Machine — Taariikhdii Website
archive.org/web/ waxay keyditaa nuqulada hore ee websites-ka. Waxaad ka heli kartaa xogta ka maqan website-ka maanta.
# Online: web.archive.org
# Geli domain-ka oo aad raadiso
# CLI
# pip install waybackpy
# waybackpy --url example.com --oldest
# Waxa aad ka raadisid:
# - Xog hore oo la qarin jiray
# - Emailyo/telefoon la saaray
# - Beero test ah ama dev environments
# - API keys la daayay si shil
🎉 Hambalyo! Waxaad dhammaystirtay Casharka 4aad! Hadda waxaad xirfad aad u muhiim ah leedahay — information gathering. Casharka xiga waxaad baranaysaa Nmap — tool-ka ugu caansan ee port scanning.