It was brought to my attention that the laboratory does not contain information on what you need to do. After trying to contact faculty services, I wasn’t able to get a hold of anyone that could discuss what needed to be done.  As we are discussing footprinting and we have colleague, I have a few things that I would like you all to run.

Install whois on Kali.  You may have issues if this is not part of the repository list. Use the following commands.

/etc/apt/sources.list

This will let you know your repository listing. Ensure that the repository listing has the following inside.

deb http://http.kali.org/kali kali-rolling main contrib non-free

Run the following commands in terminal.

apt-get update
apt-get upgrade
apt-get dist-upgrade

that should allow you to run the WHOIS installation command.

apt-get install whois

Run queries against domains.

whois caltech.edu

whois -h whois.networksolutions.com caltech.edu
whois -h whois.networksolutions.com *caltech.edu
whois -h whois.networksolutions.com .banjo
Run this against a few different websites.  Copy the text from the terminal and store it into a file. Write a one-page summary for how this information could be used to attack a network.

Given the lateness of the hour, I will be giving a full week of extra time on this. Please accept my apologies. I will be working on the next lab to ensure that you guys have it out before it’s due. Thank you for your time and understanding regarding this.