Preview

Information Gathering

Satisfactory Essays
Open Document
Open Document
359 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Gathering
Target : http://www.nytimes.com/
INTRODUCTION
Information gathering is the act of collecting information. In network security, it means getting information about an enemy that we would like to attack. There are 4 steps to do so. First and foremost, social engineering. Social engineering means getting information verbally by merely asking, or the electronic way of it is known as phishing. Secondly, by using published information. This is gained by searching the particular target online via Google search to obtain any information regarding the target. Thirdly, by using port scanning. We can download the tools and find the ports used by the target. Lastly, by using network mapping. Network mapping is the study of the physical connectivity of networks and often attempts to determine the servers and operating systems run on networks.

OBJECTIVES
The objectives of information gathering are: * The organization’s work planning will be support to become more fully inclusive. * Used to get all the information that the company or organization using many steps.

1. Social engineering gives us information about who to contact if we were to send any malicious threat to the site. For example, we obtained the phone number ((212) 556-7777) or the email (timesdigest@nytimes.com) to gain access to their system.

2. Using published information that is the url itself http://www.nytimes.com/. We ping the site by using command prompt to find out the IP address.

Procedure: i. Open CMD command ii. Ping the website address “ping nytimes.com” iii. Click Enter button iv. The command will display the ip adress of the site.

3. Using port scanning

Procedure: i. Insert IP address of the web site “170.149.168.130” using the port scanner tool. ii. Click on the Port Scan button. iii. The tool display port that used by the owner in the site. 4. Network mapping is the process of discovering the IP address or if possible their

You May Also Find These Documents Helpful

  • Good Essays

    1. Research the following organizations and explain their involvement with the internet public IP addresses.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    References: Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP…

    • 440 Words
    • 2 Pages
    Good Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    address, and presses Enter. The browser displays a new web page. What part of the web address…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    CMIT Quiz

    • 25806 Words
    • 172 Pages

    Combo with "Combo with "TestOut PC Pro A+ 220­801 / 220­802 | Troubleshooting" and 7 others" and 1 other flashcards | Quizlet…

    • 25806 Words
    • 172 Pages
    Powerful Essays
  • Good Essays

    Directional Terms

    • 302 Words
    • 2 Pages

    Several incomplete statements are listed below. Correctly complete each statement by choosing the appropriate anatomical term from the key. Record the key letters and/or terms on the correspondingly numbered blanks below:…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Education and Col

    • 964 Words
    • 4 Pages

    Richard Harland’s World Shaker, describes some of the activities that take place on board the decks of the juggernaut, an oversized mechanical object that moves around the world over land and sea in competition for business and control. At this point in the story Colbert Porpentine the main character of this steam punk novel is with his Grandfather Sir Mormus Porpentine, touring the bottom decks of the juggernaut for the first time. Earlier in the novel when Riff, a fourteen year old Filthy girl on the run appears in Col’s room, he comes to realise that he has a no knowledge of his surroundings and of the other residents who live Below. Col becomes curious as to who they are and what they do. The next morning after Riff arrived uninvited, Col’s sister “Gillabeth, marched in” (p.10) to his room, gave a few orders and then Col began questioning her knowledge about the Filthies, but she didn’t know much either or wouldn’t give out any details. They both then attended the family breakfast. After Sir Mormus announced in front of the family that Col would become the next “Supreme Commander” (p.16), Col requested that he be shown the entire juggernaut, so that he could understand the complete workings of the vessel. The reason for Col’s request was not only to benefit his knowledge but also so that he could determine a safe way for Riff to return to Below, where she belonged. Sir Mormus agrees to take Col himself. After arrangements had been made and Col prepared himself, Sir Mormus guides Col down to the lower decks of the craft. Once on the lower decks Col observes from “viewing bay 17” (p.45) where he watches the Filthies working on the lower decks and Below.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Methods

    • 4779 Words
    • 20 Pages

    I declare that ( the first four boxes must be completed for the assignment to be accepted):X This assignment does not contain any material that has previously been submitted for assessment at this or any other university. X This is an original piece of work and no part has been completed by any other student than signed below. X I have read and understood the avoiding plagiarism guidelines at http://www.swinburne.edu.au/ltas/plagiarism/students.htm and no part of this work has been copied or paraphrased from any other source except where this has been clearly acknowledged in the body of the assignment and included in the reference list. X I have retained a copy of this assignment in the event of it becoming lost or damaged. □ (optional) I agree to a copy of the assignment being retained as an exemplar for future students (subject to identifying details being removed).…

    • 4779 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Information Use

    • 777 Words
    • 4 Pages

    In today’s business environment information is the most important asset a business has, this information helps to support, maintain, develop and track its daily activities. The next logical step is implementing a system that is conducive and geared towards this goal. With the help of its information system, and its information technology department, managers, sales people, the operations department and others with access to this information have a handy tool to help them do their work on a daily basis. The structure of the information system is paramount on how accessible this information is to the people that depend upon it to complete their normal workday. The managers and IT department work closely together to agree upon and decide on an information system that will be feasible to the business itself, thus setting up a system that will be beneficial to the business itself.…

    • 777 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information Management

    • 696 Words
    • 3 Pages

    1. Think about the different disciplines addressed in the lecture. How are the disciplines of information management, information technology, and informatics related? How do they differ?…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    package lab4.t1; import java.net. *; import java.io. *; public class Lab4T1 public static void main(String[] args) throws Exception { { URL aURL = new URL("http://example.com:80/docs/books/tutorial" + "/index.html?name=networking#DOWNLOADING"); System.out.println("protocol = " + aURL.getProtocol()); System.out.println("authority = " + aURL.getAuthority()); System.out.println("host = " + aURL.getHost()); System.out.println("port = " + aURL.getPort()); System.out.println("path = " + aURL.getPath()); System.out.println("query = "…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1. Log in to the Windows 2003 machine with a username of Administrator and a password pof P@ssw0rd.…

    • 1678 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    19. Enter #show ip int brief to show what ports are assigned to each ip and if they are up and connected. (To verify the work done has worked)…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    this blog is disign to for beginer who want to be a hacker ........ & also we trying to solve general computer related problem.. i.e we want to create new era of computer hacking basics & much more…

    • 11363 Words
    • 54 Pages
    Powerful Essays