Preview

Hacking2E Lab03 AW

Satisfactory Essays
Open Document
Open Document
563 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking2E Lab03 AW
Assessment Worksheet
Data Gathering and Footprinting on a Targeted Web Site
CSS280-1502B-01 Ethical Hacking
Course Name and Number: _____________________________________________________
Ben Roberts
Student Name: ________________________________________________________________
Professor Irwin
Instructor Name: ______________________________________________________________

6/1/2015
Lab Due Date: ________________________________________________________________

Overview
The first phase of hacking is the footprinting phase, which is designed to passively gain information about a target. In this lab, you performed technical research against three Web domains using Internet search tools. You collected public domain information about an organization using the Google search engine to uncover information available on the Internet.
Finally, you recorded the information you uncovered in a research paper, describing how this information can make an organization vulnerable to hackers.
Lab Assessment Questions & Answers
1. What information can you obtain by using the WHOIS tool contained within Sam Spade?
Information about the domain owner such as contact numbers, addresses, phone numbers, and names of associated servers.

2. Besides the WHOIS utility covered in this lab, what other functions did you discover are possible with the Sam Spade utility?
Ping, NSlookup, IP Block, Dig, Traceroute, Finger, SMTP Verify, Time, Blacklist, Abuse Lookup.

3. What is the purpose of the tracert command? What useful information does the trace route tool provide? How can this information be used to attack the targeted website?
This tool is used to identify the path that must be followed to reach one system from another. It provides the names and IP addresses of all intermediate systems. That can be used for an attack by identifying the geographic location and identifying potential attack points.

4. Is Sam Spade an intrusive tool? What is your perspective on the use of a freeware utility such

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data captured and reconstructed…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    LAb1Ecet230

    • 221 Words
    • 3 Pages

    1. Using the results of the compilation for the Design Project, what percent of the FPGA is used to implement the design.…

    • 221 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    A network administrator issues the command show ip route and observes this line of output:…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    NT2640 Final Review

    • 1061 Words
    • 5 Pages

    8. Which Cisco IOS show command aids in the troubleshooting of routing protocols by displaying information on which protocol(s) is enabled and as well as passive interfaces?…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Lab1KKdoc

    • 511 Words
    • 3 Pages

    1-After a brain injury, the first step is to assess respiratory rate for rate, and depth and the cardiac system for rate and rhythm. Where is the respiratory and cardiac center located?…

    • 511 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following? Routing method…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Network software uses this when my IP does not match any routes on routing chart.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report is to provide insight on nefarious computer activities called ping sweeps and port scans as a request from management. I will identify them, explain what they are use for, how they are used and how to stop them from attacking a network. Finally I will discuss how they can be eliminated as security risk. The information in this report is designed to increase the understanding and knowledge of these two activities so that this company’s IT department will be in a better position to recognize them and block potential attacks from their use.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Chi Hieu

    • 2556 Words
    • 11 Pages

    * We use third-party analytics tools to help us measure traffic and usage trends for the Service. These tools collect information sent by your device or our Service, including the web pages you visit, add-ons, and other information that assists us in improving the Service. We collect and use this analytics information with analytics information from other Users so that it cannot reasonably be used to identify any particular individual User.…

    • 2556 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    b. Almost all of their software products is for their big clients such as accenture, advance, Aeon, Allied Telesis, CHAMP, CISCO, CORMANT Technologies so they don’t give the overview of their products because of security purposes and copyrighted.…

    • 1063 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    We transfer information to vendors, service providers, and other partners who globally support our business, such as providing technical infrastructure Apps, analyzing how our Apps are used, measuring the effectiveness of ads and Apps, providing customer service, facilitating payments, or conducting academic research and surveys. These partners must adhere to strict confidentiality obligations in a way that is consistent with this Privacy Policy and the agreements we enter into with…

    • 1989 Words
    • 8 Pages
    Better Essays