Passive Footprinting Using Windows Command-Line Utilities

Nerd Cafe | نرد کافه

Scenario Context

  • Role: Ethical Hacker / Security Analyst

  • Objective: Perform initial footprinting on a publicly accessible domain using only native Windows tools

  • Target: www.certifiedhacker.com (or an instructor-approved domain)

  • Rules of Engagement:

    • No exploitation

    • No credentialed access

    • Passive reconnaissance only

    • Authorized lab or written permission assumed

Lab Objective

By the end of this exercise, you will be able to:

  • Resolve a domain to its IP address

  • Verify host reachability

  • Identify effective MTU size on the network path

  • Enumerate intermediate routers (hops)

  • Extract DNS infrastructure details

  • Understand how attackers and defenders interpret these results

Environment Setup (Pre-Lab Checklist)

  • Windows 10 / 11 / Server 2016+

  • Command Prompt opened as Administrator

  • Active internet connection

  • DNS resolution working (ipconfig /all should show a DNS server)

  • Target domain is reachable from your network

circle-info

Hint: If commands fail immediately, verify DNS and gateway configuration before proceeding.

Task 1: Domain Reachability & IP Resolution (Ping)

Goal

Determine whether the target is alive and identify its resolved IP address.

Steps

  • Open Command Prompt

  • Execute:

Observe

  • Resolved IP address

  • Packet statistics (sent, received, lost)

  • Round-trip time (RTT)

Hints

  • The first reply line reveals the IP address

  • Even if replies fail, DNS resolution may still succeed

  • ICMP Echo Request = Type 8

  • ICMP Echo Reply = Type 0

Analyst Notes

  • No reply ≠ system offline

  • Firewalls commonly block ICMP to reduce reconnaissance

Task 2: Identify Maximum Frame Size (MTU Discovery)

Goal

Determine the largest packet size that can traverse the network without fragmentation.

Steps

  • Send a packet with DF bit set:

  • If fragmentation error occurs, reduce packet size:

  • Continue adjusting size until replies succeed

  • Fine-tune by incrementing/decrementing by 1 byte

Hints

  • -f = Do Not Fragment

  • -l = Payload size only (does not include headers)

  • IP + ICMP headers = 28 bytes

Expected Insight

  • If 1472 succeeds → MTU is 1500

  • If fragmentation occurs → path MTU is lower

Why This Matters

  • Fragmentation increases detection risk

  • Used in stealth scanning, DoS tuning, and packet crafting

Task 3: Validate Using Tracert

Goal

Compare manual TTL discovery with Windows traceroute.

Steps

Observe

  • Number of hops

  • Latency per hop

  • Asterisks (*) indicating blocked probes

Security Insight

  • High latency hops may indicate:

    • Congestion

    • Geographic distance

    • Filtering or rate limiting

Task 4: DNS Enumeration with Nslookup

Goal

Identify DNS records and authoritative infrastructure.

Steps

  • Enter interactive mode:

  • Check default DNS server

  • Set record type to A:

  • Query domain:

  • Change record type:

  • Query root domain:

Hints

  • Non-authoritative = cached response

  • CNAME reveals backend hosting or DNS structure

  • Authoritative servers are high-value targets

Task 5: Enumerate Name Server IP

Goal

Resolve authoritative DNS server to its IP address.

Steps

circle-info

Hint: Replace with your discovered name server.

Analyst Notes

  • DNS servers are critical infrastructure

  • Attacks often target availability, not data

Documentation & Reporting (Mandatory)

Record the following:

  • Target domain

  • Resolved IP address

  • Packet loss & RTT

  • Maximum payload size (MTU discovery)

  • Hop IPs and count

  • Authoritative DNS servers and IPs

circle-info

Hint: Professional penetration tests are judged as much by documentation as by execution.

💖 Support Our Work

If you find this post helpful and would like to support my work, you can send a donation via TRC-20 (USDT). Your contributions help us keep creating and sharing more valuable content.

octagon-check

TRC-20 Address: TAAVVf9ZxUpbyvTa6Gd5SGPmctBdy4PQwf

Thank you for your generosity! 🙏

Keywords

Footprinting, Passive reconnaissance, ICMP, Ping, Tracert, Nslookup, DNS enumeration, DF bit, MTU discovery, TTL, ICMP echo request, ICMP time exceeded, Packet fragmentation, Path MTU, Network mapping, Hop count, Authoritative DNS, Non-authoritative response, Name server, Ethical hacking , Nerd Cafe , نرد کافه

Channel Overview

🌐 Website: www.nerd-cafe.irarrow-up-right

📺 YouTube: @nerd-cafearrow-up-right

🎥 Aparat: nerd_cafearrow-up-right

📌 Pinterest: nerd_cafearrow-up-right

📱 Telegram: @nerd_cafearrow-up-right

📝 Blog: Nerd Café on Virgoolarrow-up-right

💻 GitHub: nerd-cafearrow-up-right

Last updated