SaurabhShukla228405
4 views
27 slides
Oct 22, 2025
Slide 1 of 27
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
About This Presentation
This document explains the Domain Name Investigation in Cyber forensics.
Size: 1.42 MB
Language: en
Added: Oct 22, 2025
Slides: 27 pages
Slide Content
Introduction to Domain Name
Inlaymanlanguagethewebsiteisalsoknownas
domainname.Incyberworldsomedomainnamemay
berelatedtocybercrime.Thisdomainnameprovides
ahugeamountofinformationrelatedtocyber
criminals.criminals.
DNSstandsforDomainNameSystem.Itresolvesthe
websitenametoitscorrespondingIPaddress.Inother
words,theobjectiveofDNSistoresolvethefully
qualifieddomainname(FQDN)intoanIPaddress.
Thisprocessisknownasnameresolution.
DNS Zones
TheDNShastwozones,thefirstzoneisknownas
forwardlookupzoneandthesecondisknownasthe
reverselookupzone.
ForwardLookupzone------DomaintoIPaddress
ReverseLookupzone-------IPtoDomainname
DNSperformsthequeryusingtheDNSdatabase.The
databasecontainsIPaddress,Hostname,MXrecord,
etc.ThestructureoftheDNSdatabaseisdistributed,
replicated,andhierarchicalinnature
DNS Database
DNS Database
CNAME Record
CNAME Record map one domain name to another
domain name
A Record
MX Record
SOA Record
SOA record is also known as Start of Authority Record.
It basically contains master and slave DNS record for
sync purpose only.
Time to live (TTL)
Timetolive(TTL)iswhatdictateshowlongyourrecords
staycached.Forexample,forhowlongyourArecordwill
becachedbeforetheretrievalofanewcopyofthe
recordfromDNSservers.Therecordstorageisknownas
theDNSCache,andtheactofstoringrecordsiscalled
cachingcaching
Time to live (TTL)
Theunitsusedareseconds.AnoldercommonTTLvalueforDNSwas
86400seconds,whichis24hours.ATTLvalueof86400wouldmeanthat,
ifaDNSrecordwaschangedontheauthoritativenameserver,DNSservers
aroundtheworldcouldstillbeshowingtheoldvaluefromtheircachefor
upto24hoursafterthechange.
How DNS works in details
SupposeanorganizationABCismanagedbythreedepartmentsHR,
Accounts,andIT.
Theownermonitorstheperformanceoftheorganization.Thedepartments
HR,accounts,andIThave5memberseach.
Supposeanyonewantstocontactamemberofanydepartment.The
questionariseswherehe/sheshouldcontactfirst.
Hence,youhavetochecksalistofnamesalongwithphonenumbers.WeHence,youhavetochecksalistofnamesalongwithphonenumbers.We
knowthateachdepartmenthasaheadofdepartment(HoD)tohandlea
queryofspecificdepartment.
HoDName Department
Anju HR
Rajesh ACCOUNTS
Vishal I.T
How DNS works
The members of I.T departments are Mr. Vishalis HoDof I.T department
Members Department
Tom
I.T
Jhon
RameshRamesh
How DNS works
The list of members in the HR department are
Members Department
Rudransh
HR
Ivan
Jyoti
How DNS works
The list of members in the ACCOUNTSdepartment
Members Department
Shail
ACCOUNTS
NeerajKumar
KPSingh
How DNS works
SupposeifanyonewantstocontactMr.Tomworkinginthe
I.T.department,thenhe/shemustfirstcontacttheHoDof
I.T.,thatis,Mr.Vishal,andthenhe/shecancontactthat
particularmember,thatis,TomofI.T.Now,youcan
comparethissituationtoDomainNameandIPaddress.
HereMr.Vishalworksasanameserverandphonenumber
HereMr.Vishalworksasanameserverandphonenumber
equaltoIPaddressrelatedtoaspecificdepartment.You
canassumethedepartmentnameasDomainName
andMr.TomworksasaWebserver.Inthesameway,all
membersofdepartmentsworkasawebserverandHoD
worksasnameservers.Thelistsareworksaszonesfile.
DOMAIN NAME INVESTIGATION USING OSINT
Thefirststepinyourinvestigationistovisitthewebpagesofyourtargetcompany.
Thereisalotofimportantinformationthatcanbeobtainedfromatarget's
website.Theyincludebutarenotlimitedtothefollowing.
Physical address
Branch office locations
Key employees
Current job postings (This may reveal technologies used in the company)
Phone numbers
Partner companies
Open hours and holidays
News about target organization (merger or acquisition news)
Technologies used in building the website
Email system used
IT technologies (hardware and software) used by target organization
VPN provider (if any)
Digital files and metadata
Information about the organization’s employees
Domain name registration information
The typical information provided includes—
■Registered owner’s name and address.
■Billing information.
■Administrative contact.
■Range of IP addresses associated with the domain.
Technical contact information. ■Technical contact information.
Where’s the evidence?
Information can be found in numerous locations,
including—
User’s computer.
ISP for the user.
ISP for a victim and/or suspect.
Log files contained on the victim’s and/or suspect’s—
Routers.
Firewalls.
Web servers.
E-mail servers.
Other connected devices.
Information that may be obtained from the ISP includes
Subscriberinformationsuchastheregisteredowner,
address,andpaymentmethod.
Transactionalinformationsuchasconnectiontimes,
dates,andIPaddressused.
Note:-SomeISPsmaskedtherealinformationof
subscriberstorandominformation.Inthiscaseyousubscriberstorandominformation.Inthiscaseyou
havetocontacttheISPsviae-mail.Exampleisgivenin
nextslide