Preview

Is317 Lab #3 Questions

Good Essays
Open Document
Open Document
430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is317 Lab #3 Questions
Lab #3 Questions
1. Which reconnaissance tool comes with Microsoft Windows that can provide and can be initiated from the DOS command prompt? What useful information does this query provide?
Sam Spade - Zone Transfer ask a DNS server for all it knows about a domain, SMTP Relay Check whether a mail server allows third party relaying, Scan Addresses scan a range of IP addresses looking for open ports, Crawl website search a website, looking for email addresses, offsite links, etc., Browse web browse the web in a raw http format, Check cancels search your news server for cancel messages, Fast and Slow Traceroute find the route packets take between you and a remote system, S-Lang command issue a scripting command; useful for debugging scripts, Decode URL decipher an obfuscated URL, Parse email headers read email headers and make a guess about the origin of the email

2. What is the difference between ARIN, RIPE, IANA? What regions of the world do these domain name registry organizations cover?
ARIN - North America, Africa below the equator and parts of the Caribbean. APNIC - Asia and Pacific Region, LACNIC - Latin America and parts of the Caribbean, and RIPE - Europe, parts of Asia, Africa above the equator, and the Middle East.

3. What other functions can be completed using the Sam Spade Utility? ping, traceroute, whois, finiger, nslookup

4. What is the purpose of the traceroute command? What useful information does traceroute provide? How can this information be used to attack the targeted website?
It traces the routes packets from the user to the target, it shows a packets hops to the target, and they target the host address.

5. What important information can be gleaned from a whois record for a website?
Whois provides ownership and contact information for the specified host's domain.

6. How many different WhoIs profiles are pre-loaded in the Sam Spade Utility?
100

7. Is Sam Spade an intrusive tool? What is your perspective on the use of a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer’s full time position as Sales would need Sales access for her primary position. She should only have By Position access to Accounts Payable when she is working that position. She would need Read Only for Shipping and Receiving in order provide customers with information on inventory availability. Neither of her positions should have required her to have full access to Shipping and Receiving.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Is3350 Final Exam

    • 1039 Words
    • 5 Pages

    Rationale: The client should focus on a distant object in order to promote pupil dilation. The ophthalmoscope should be set on the 0 lens to…

    • 1039 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    5. Why is it important to put the swap file on a separate partition from the root (/)partition?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter.…

    • 1103 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    in terms of bandwidth and storage. Your company has never traded with the U.S. Government at this…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    I was able to review the duplicate KG’s and resolve them. There were several different issues that cause the duplication.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 1 Assignment

    • 1325 Words
    • 6 Pages

    In all, Figure 4 shows a calculation of 64% accuracy rate for correct answers given in his small reading group. I could tell that Michael felt like he was on a roll, and he made a surprising request that none of his peers groaned about. “Can we finish by ourselves?” The teacher gave consent for the class to finish independently, and they did. As an added bonus, the reading specialist shared an entire sheet of heart stickers made by her husband to celebrate Valentine’s Day early. Michael happily received his reward while trying to estimate the total stickers on the sheet (see Figure 5). When he saw the red heart, he stated, “I don’t want the heart to camouflage on my red sweater.” Therefore, Michael placed the heart on his white collar (see Figure 6).…

    • 1325 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 653 Words
    • 3 Pages

    1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree.…

    • 653 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweep is a type of network probe or network attack. People uses ping sweep to know if a computer or network exist. Basically, the user ping the computer or network by their IP Address. Once the ping request has been sent, the user should get a reply back from the computer, notifying the user that it is online. If the user did not receive any reply then more likely the computer is down. The ping sweep method can also be used by hackers to know which computers or networks are available, so they can plan their attack. According to Lawrence Theo, (Networks Probes Explained: Understanding Port Scans and Ping Sweeps), “fping is a tool that can be used for conducting ping sweeps”. “Unlike normal ping, fping sends one ping packet to one IP address, and then proceeds immediately to the next IP address.” Learning ping sweep and how it can be used is essential to protect our information.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Gathering information about a remote system is often considered the first step an "intelligent hacker” takes in launching an attack against or gain privileged access to a target machine. Intelligence gathered in this research can provide useful information about vulnerabilities or misconfigurations that can be successfully exploited by the potential intruder. The more a hacker knows about a particular system (e.g. the operating system (OS), the hardware architecture and services that are running), the greater are his or her chances of launching a successful attack. By knowing the operating system and system type, a hacker can do a little research and come up with a list of known vulnerabilities.…

    • 9158 Words
    • 37 Pages
    Powerful Essays