Data Gathering and Footprinting on a Targeted Web Site
CSS280-1502B-01 Ethical Hacking
Course Name and Number: _____________________________________________________
Ben Roberts
Student Name: ________________________________________________________________
Professor Irwin
Instructor Name: ______________________________________________________________
6/1/2015
Lab Due Date: ________________________________________________________________
Overview
The first phase of hacking is the footprinting phase, which is designed to passively gain information about a target. In this lab, you performed technical research against three Web domains using Internet search tools. You collected public domain information about an organization using the Google search engine to uncover information available on the Internet.
Finally, you recorded the information you uncovered in a research paper, describing how this information can make an organization vulnerable to hackers.
Lab Assessment Questions & Answers
1. What information can you obtain by using the WHOIS tool contained within Sam Spade?
Information about the domain owner such as contact numbers, addresses, phone numbers, and names of associated servers.
2. Besides the WHOIS utility covered in this lab, what other functions did you discover are possible with the Sam Spade utility?
Ping, NSlookup, IP Block, Dig, Traceroute, Finger, SMTP Verify, Time, Blacklist, Abuse Lookup.
3. What is the purpose of the tracert command? What useful information does the trace route tool provide? How can this information be used to attack the targeted website?
This tool is used to identify the path that must be followed to reach one system from another. It provides the names and IP addresses of all intermediate systems. That can be used for an attack by identifying the geographic location and identifying potential attack points.
4. Is Sam Spade an intrusive tool? What is your perspective on the use of a freeware utility such