Hacker Techniques, Tools, And Incident Handling by Oriyano

Hacker Techniques, Tools, And Incident Handling by Oriyano

Assessment Worksheet
Data Gathering and Footprinting on a Targeted Web Site
ITN 261
Course Name and Number: _____________________________________________________
Dhairya Patel
Student Name: ________________________________________________________________
Dr. Henry Coffman
Instructor Name: ______________________________________________________________

09/27/15
Lab Due Date: ________________________________________________________________

Overview
The first phase of hacking is the footprinting phase, which is designed to passively gain
information about a target. In this lab, you performed technical research against three Web
domains using Internet search tools. You collected public domain information about an
organization using the Google search engine to uncover information available on the Internet.
Finally, you recorded the information you uncovered in a research paper, describing how this
information can make an organization vulnerable to hackers.
Lab Assessment Questions & Answers
1. What information can you obtain by using the WHOIS tool contained within Sam Spade?
Domain owner, including contact names, numbers, addresses, and the names of associated serves.

2. Besides the WHOIS utility covered in this lab, what other functions did you discover are possible
with the Sam Spade utility?
That you can Ping, nslookup, Whois, IP Block, Dig, Traceroute, Finger SMTP Verify, Time, Blacklist,
and Abuse Lookup.

3. What is the purpose of the tracert command? What useful information does the trace route tool
provide? How can this information be used to attack the targeted website?
it identify the network path that must be followed to reach one system from another.
It provides the names and IP addresses of all intermediate systems and can be used to identify
potential intermediate attack points, and can estimate the geographic location of the server.
You
can
use this
information
byWhat
usingisthe
found
network paths
allof
the...

Similar Essays