In this recipe we will use Maltego CE to gather information about a target's domain name:
In the upper left-hand corner, click on the new graph button:
On the left, select Entity palette. Scroll down to Infrastructure, and click on Domain. Drag it onto the graph.
Rename paterva.com to example.com; example.com will suffice as the target domain for this round of testing:
Maltego - New Graph page
We will use example.com for some of our initial testings. The example.com is a reserved site dedicated to documentation. It has some infrastructure behind it. The infrastructure is minimal, so some results will not be complete. You can use example.com for your testing or a domain you are authorized to access.
Right-click on the example.com domain icon, which will show you a variety of transform options. Let's start by getting the whois information. Navigate to Threat Miner | [Threat Miner] Domain to Whois Details. This will reach out and pull all the publicly available information on the domain. If you now double-click on the domain icon, and select Properties (14) from the top. Then, you will see that all the information is populated:
Spend a minute getting used to how the transform interface works. Right-click on example.com to open the Run Tansform(s) dialog. Along the left edge, you may notice a return arrow, which can bring you back in the transform menu. Depending on where you are, you may need to click back a couple times to get back to the root transform screen; go into a couple of the populated choices as needed.
Continue building the graph and have it populate the name servers. Right-click on example.com, and select Paterva CTS | DNS from Domain | To DNS name - NS (name server). You will now see our name servers populating: