Description
There are numerous freely-available tools that allow hackers to gather a considerable amount of information about organizations via their websites. In this assignment, you will use some of these tools.
Select a Middle Eastern company with a website. Utilize the WHOIS command in the DOS terminal and record the data found. Things to consider would be:
- The physical location, email addresses of contacts shown, applicable phone numbers and all name servers.
- NSLookup command for IP addresses and MX records
- Trace route information
- DNS zone transfer information records
- Ping sweeps, UDP scans, operating system identification, etc.
All of this can be performed on a DOS window or terminal. After performing the above footprinting methods, write a short paper discussing how these techniques would be used by a hacker to gain information access to the network.
Your paper is required to be 2-3 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow University academic writing standards and APA style guidelines, as appropriate.
Resource: The following white paper, “Footprinting: What Is It, Who Should Do It, and Why?,” will be helpful as you complete this assignment.
Note: This cannot be used as your required scholarly source.
Course's Textbook:
Oriyano, S. P. (2014). Hacker techniques, tools, and incident handling (2nd ed.). Burlington, MA: Jones & Bartlett Learning.
Explanation & Answer
In future you can invite me to work on your questions through exclusive invite. I can handle tasks within short periods of time and at the same time deliver quality work.
Running head: GATHERING INFORMARION
Gathering Information
Student’s Name
Institutional Affiliation
1
GATHERING INFORMATION
2
Gathering Information
Although the internet has revolutionized the way we conduct our affairs, it is risk
platform owing to the malicious activities of hackers. Nowadays corporations and people
carry out most of their communications and transaction over the internet, not knowing the
risks involve if proper caution is not considers. For instance hackers can user information
such as user’s email, IP address, physical location and trace router information to access the
confidential particulars. If s...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
No Exit
by Taylor Adams
The Power of Habit - Why We Do What We Do in Life and Business
by Charles Duhigg
Bridge to Terabithia
by Katherine Paterson
The Secret Garden
by Frances Hodgson Burnett
Macbeth
by William Shakespeare
A Separate Peace
by John Knowles
Silas Marner
by George Eliot
Brave New World
by Aldous Huxley
Z for Zachariah
by Robert C. O’Brien