0% found this document useful (0 votes)
26 views32 pages

Report INF203 LAB2

The document provides instructions for analyzing various aspects of three websites such as their analytics tools, technology stack, IP addresses, subdomains, organization details, employees, search results mentioning credentials, operating systems, running services, DNS records, port scanning, vulnerabilities, expired SSL certificates, emails in web content, HTTP headers, and hacked emails.

Uploaded by

Assadbek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views32 pages

Report INF203 LAB2

The document provides instructions for analyzing various aspects of three websites such as their analytics tools, technology stack, IP addresses, subdomains, organization details, employees, search results mentioning credentials, operating systems, running services, DNS records, port scanning, vulnerabilities, expired SSL certificates, emails in web content, HTTP headers, and hacked emails.

Uploaded by

Assadbek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

My sites are >> kase.kz, adobe.com, coursera.

org
1. Investigate and identify the tools the website uses for analytics and
tracking
Kase.kz (Kazakhstan Stock Exchange)
Adobe.com

Coursera.org
2. Identify the technology stack that is used on the website.
I used an extension called “Wappalyzer” to determine the technology stack
that is used on the website.
Kase.kz Adobe.com
Coursera.org

3. Find the IP address or addresses associated with the domain


I used the “nslookup” command to find addresses associated with the domain
Kase.kz

Adobe.com Coursera.org
4. Conduct a subdomain enumeration to identify all subdomains
associated with the target domain
I use the command “python sublist3r.py -d example.com” for enumerate
subdomains associated with target domain
Kase.kz
Adobe.kz
Coursera.org
5. Discover and provide information on the organization associated
with the website. Look for details such as the organization's name,
address, and any publicly available information.
I use the “whois” command for to look details such as the organization’s
name, address, more available information
Kase.kz Adobe.com
Coursera.org

6. Search for a list of employees working in the organization and


identify their email addresses
I use the website is called “hunter.io” for finding list of employees
organization
Kase.kz

Adobe.com
Coursera.org
7. Perform a Google search with the site operator to find results
containing the word "Credentials" in the text on the target website.
Analyze the search results and report the number of instances
I use the “googler -w site:domain.com “Credentials”
Kase.kz
Adobe.com
Coursera.org
8. Find an operating system that is installed on the server.
I use the nmap -O domain.com command for finding OS
Kase.kz Adobe.com
Coursera.org
9. Find services that are running on the server. Provide information
about port numbers, service names, versions, and so on
I used the “nmap -sV domain.com” command for scan ip addresses for to
know open ports and etc.
Kase.kz Adobe.com
Coursera.org
10. Provide information about DNS Servers, MX records, and TXT
records related to the domain
I used the “dig” command for providing information about DNS servers
Kase.kz
Adobe.com
Coursera.org
11. Perform scanning of all 65,535 ports on the server.
I used the “nmap” command for scanning all ports
Kase.kz Adobe.com
Coursera.org
12. Find possible vulnerabilities related to HTTP using NSE
Kase.kz Adobe.com
Coursera.org

13. Find expired SSL certificates of domains and subdomains


Kase.kz
Adobe.com Coursera.org
14. Find all emails that are available in the web content of the website
Kase.kz Adobe.com
Coursera.org
15. Provide the HTTP headers used by domain or subdomains
Kase.kz Adobe.com
Coursera.org
16. Provide a list of hacked email addresses of the organization
Kase.kz
Adobe.com
Coursera.org

You might also like