Hi CIP!
I’m doing red team for the first time. I want to know is nslookup counts in passive recon?
for i in cat linux.hosts; do nslookup $i | grep ^Name -A1| awk ‘{print $2}’;echo;done > outputfile
I want to run this script, should i do that or it will raise any flags?
I’m doing as i want ips of from my created subdomains list.
If it is in a short amount time, it will definitely be possible to raise a flage.
I would suggest to use search engines / shodan.io or maybe criminlaip.io / certificate databases
that’s more like “passive recon”
then you better cover your as. as i said: if you can split up the request for example via tor and let it run over a longer timeframe, i’d say it’s really hard to identify as active recon or ask different nameservers