Gathering Information

User Generated

qvfthvfr

Programming

Description

There are numerous freely-available tools that allow hackers to gather a considerable amount of information about organizations via their websites. In this assignment, you will use some of these tools.

Select a Middle Eastern company with a website. Utilize the WHOIS command in the DOS terminal and record the data found. Things to consider would be:

  • The physical location, email addresses of contacts shown, applicable phone numbers and all name servers.
  • NSLookup command for IP addresses and MX records
  • Trace route information
  • DNS zone transfer information records
  • Ping sweeps, UDP scans, operating system identification, etc.

All of this can be performed on a DOS window or terminal. After performing the above footprinting methods, write a short paper discussing how these techniques would be used by a hacker to gain information access to the network.

Your paper is required to be 2-3 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow University academic writing standards and APA style guidelines, as appropriate.

Resource: The following white paper, “Footprinting: What Is It, Who Should Do It, and Why?,” will be helpful as you complete this assignment.

Note: This cannot be used as your required scholarly source.


Course's Textbook:
Oriyano, S. P. (2014). Hacker techniques, tools, and incident handling (2nd ed.). Burlington, MA: Jones & Bartlett Learning.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

In future you can invite me to work on your questions through exclusive invite. I can handle tasks within short periods of time and at the same time deliver quality work.

Running head: GATHERING INFORMARION

Gathering Information
Student’s Name
Institutional Affiliation

1

GATHERING INFORMATION

2
Gathering Information

Although the internet has revolutionized the way we conduct our affairs, it is risk
platform owing to the malicious activities of hackers. Nowadays corporations and people
carry out most of their communications and transaction over the internet, not knowing the
risks involve if proper caution is not considers. For instance hackers can user information
such as user’s email, IP address, physical location and trace router information to access the
confidential particulars. If s...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags