0% found this document useful (0 votes)
263 views2 pages

IS4560 Lab3

IS4560 Lab 3 Assessment

Uploaded by

rtucker84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
263 views2 pages

IS4560 Lab3

IS4560 Lab 3 Assessment

Uploaded by

rtucker84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Lab #3 Assessment Worksheet

Data Gathering and Footprinting on a Targeted Web Site


IS4560
Course Name and Number: _____________________________________________________

Student Name: ________________________________________________________________


Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
The first phase of hacking is the footprinting phase, which is designed to passively gain
information about a target. In this lab, you performed technical research against three Web
domains using Internet search tools. You collected public domain information about an
organization using the Google search engine to uncover information available on the Internet.
Finally, you recorded the information you uncovered in a research paper, describing how this
information can make an organization vulnerable to hackers.
Lab Assessment Questions & Answers
1. What information can you obtain by using the WHOIS tool contained within Sam Spade?
Domain owner, Technical contact names, numbers, addresses, and the names of associated servers(Name,
Host ) , Country , time domain was created and updated

2. Besides the WHOIS utility covered in this lab, what other functions did you discover are possible
with the Sam Spade utility?
Ping, nslookup, Whois, IP Block, Dig, Traceroute, Finger SMTP Verify, Time, Blacklist, IP block , crawl website

3. What is the purpose of the tracert command? What useful information does the trace route tool
provide? How can this information be used to attack the targeted website?
It identifies the network path that must be followed to reach one system from another,It provides the names and
IP addresses of all intermediate systems and can be used to identify potential intermediate attack points, and
can estimate the geographic location of the server, using the found network paths of all the systems to attack

4. Is Sam Spade an intrusive tool? What is your perspective on the use of a freeware utility such as
Sam Spade?
It is not an intrusive tool. I think these tools are great, they allow any network engineer the oportunity to find
vulnerabilities or sensitive information.

5. By its nature, WHOIS information must be publicly available. What do you think companies and
organizations should do with regard to this information?
Ensure that the public facing information has no affect on the internal structure. Any information given, should
be non-revealing. For instance, if the server it reaches is listed, ensure that it is in the DMZ and functions as a
proxy, that way the true address is never dislcosed, also user information should be removed along with phone

6. How can you find out who is the CEO of a company?


This can done through a variety of websites where the company and publicly traded information is kept.
Reuters, and Hoover are just two that are out there

7. What is the goal when trying to use a search engine for data gathering or footprinting?
You are attempting to locate any useful information for a possible exploit. Either through a future social
engineering or phishing scam to a physical breach of the facility, it all begins with the information gathering and
mapping/ foot-printing phase

8. From the basis of the information you uncovered, who are the primary technical contacts for the
apples.com, oranges.com and bananas.com domains?
It looks as though they have removed the specific person and it is listed as the domain or the technical
development team, administrative contact remains

9. Where do you think the servers are located that host the apples.com, oranges.com and bananas.com
domains? Provide evidence to support your claims.
Germany, New York and Washington . It is the location of the web administrators for each site

10. What are the primary IP addresses for DNS servers hosted on the apples.com, oranges.com, and
bananas.com domains?
Apples: 10.20.100.20 Oranges: 192.168.40.9 Bananas: 192.168.3.5

Copyright 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

You might also like