website investigation and information gathering

User Generated

fnsvyvar

Computer Science

Description

There are numerous freely-available tools that allow hackers to gather a considerable amount of information about organizations via their websites. In this assignment, you will use some of these tools.

Select a Middle Eastern company with a website. Utilize the WHOIS command in the DOS terminal and record the data found. Things to consider would be:

  • The physical location, email addresses of contacts shown, applicable phone numbers and all name servers.
  • NSLookup command for IP addresses and MX records
  • Trace route information
  • DNS zone transfer information records
  • Ping sweeps, UDP scans, operating system identification, etc.

All of this can be performed on a DOS window or terminal. After performing the above footprinting methods, write a short paper discussing how these techniques would be used by a hacker to gain information access to the network.

Your paper is required to be 2-3 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow APA style guidelines, as appropriate.

Resource: The following white paper, “Footprinting: What Is It, Who Should Do It, and Why?,” will be helpful as you complete this assignment.

Note: This cannot be used as your required scholarly source.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: FOOTPRINTING AND SCANNING

Footprinting and Scanning Security Assessment
Student’s Name
Institution of Affiliation
Course + Code
Date

1

FOOTPRINTING AND SCANNING

2

Footprinting and Scanning Security Assessment
Introduction
A security assessment is an essential procedure that enables an organization to identify
the freely-available tools that allow hackers to gather a considerable amount of information
about organizations via their websites. However, using the WHOIS command in the DOS
terminal an organization such as Global Telecom Holding (2018) can take record of the data
found to ensure that the security of the business, as well as the clients, are safe. Their tools that
hackers use to be able to get access to valuable information with the potential of damaging the
company and its stakeholders include footprinting and scanning
Tools Used for Footprinting and Scanning a Network
Footprinting and scanning are techniques that enable Global Telecom Holding (2018) to
test its security system with the high potential of exploitation by the hackers. The footprinting
may be in the form of identifying the physical location, email addresses of contacts shown,
applicable pho...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags