You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Lab Task 3 for Penetration Testing — Full information gathering phase covering passive OSINT (Netcraft, Whois), DNS reconnaissance, email harvesting with theHarvester, manual port scanning with Netcat, and active scanning with Nmap against a Windows XP target on Kali Linux.
Penetration Testing — Lab Task 3: Information Gathering
Student: Uliya Fatima | Roll No: 232098 Course: Penetration Testing | Lab: Task 3 Date: March 6, 2026
Overview
This lab documents the complete Information Gathering phase of a penetration test, covering:
Passive OSINT reconnaissance (Netcraft & Whois)
DNS enumeration and zone transfer attempts
Email address harvesting (theHarvester)
Manual port scanning with Netcat
Nmap SYN scan, version detection, OS fingerprinting, and UDP scanning
Target
Type
nmap.org
Passive OSINT & DNS Recon
scanme.nmap.org
Active scanning (authorized)
192.168.84.128
Windows XP VM — Active scanning
192.168.84.129
Kali Linux — Attacker machine
Task 1 — Passive OSINT: Netcraft & Whois
Netcraft Findings (nmap.org)
Field
Value
Hosting Provider
Linode / Akamai Technologies
Web Server
Apache
OS
Linux
IP Address
45.33.32.156
SSL Issuer
Let's Encrypt
CAA Record
0 issue "letsencrypt.org"
Whois Findings
Field
Value
Registrar
Dynadot Inc
Registrant
REDACTED (privacy protected)
Name Servers
ns1–ns5.linode.com
Registered
18 January 1999
Expires
18 January 2029
Network Owner
Akamai Technologies, Inc.
IP Block
45.33.0.0/17
Country
United States (Cambridge, MA)
Task 2 — DNS Reconnaissance & Zone Transfer
nslookup Results
Record
Value
A (IPv4)
45.33.32.156
AAAA (IPv6)
2600:3c01::f03c:91ff:fe18:bb2f
MX (Priority 1)
ASPMX.L.GOOGLE.COM
NS
ns1–ns5.linode.com (Linode/Akamai)
SSL Issuer (CAA)
letsencrypt.org
SPF
Google + Linode IPs
Zone Transfer Attempt
host -l nmap.org ns1.linode.com
Result: REFUSED — Server returned communications error: end of file. Zone transfers are restricted to authorized secondary DNS servers only — expected behavior on a securely configured DNS server.
sudo nmap -O 192.168.84.128
sudo nmap -A 192.168.84.128
Field
Value
OS
Windows XP SP2-SP3 / Windows Server 2003
Hostname
ADMIN
Workgroup
WORKGROUP
SMB Signing
Disabled⚠️ (vulnerable to SMB relay)
SMB2
Not supported (XP)
Subnet Sweep
sudo nmap -sV -n 192.168.84.0/24
IP
Role
Open Ports
192.168.84.1
VMware Host
902, 912, 5357
192.168.84.128
Windows XP Target
25, 80, 135, 139, 443, 445, 1025
192.168.84.129
Kali Linux (Attacker)
—
192.168.84.254
VMware DHCP/NAT Gateway
None
Risk Assessment
⚠️HIGH RISK: The Windows XP target exposes multiple critically vulnerable services. Port 445 (SMB) is directly vulnerable to EternalBlue (MS17-010) — a publicly available Metasploit exploit enabling unauthenticated remote code execution. Port 80 (IIS 5.1) has known RCE CVEs including WebDAV exploits. SMB message signing being disabled enables SMB relay attacks. The guest account used for SMB auth further lowers the exploitation barrier. This target presents an extremely high risk profile typical of unpatched Windows XP systems.
Lab Task 3 for Penetration Testing — Full information gathering phase covering passive OSINT (Netcraft, Whois), DNS reconnaissance, email harvesting with theHarvester, manual port scanning with Netcat, and active scanning with Nmap against a Windows XP target on Kali Linux.