2.2 Passive and Active Reconnaissance, Vulnerabilities
2.2 Passive and Active Reconnaissance, Vulnerabilities
2. A
Part 1: Passive and Active Reconnaissance
1. Perform passive reconnaissance on fullstackacademy.com(opens in a new tab). This may
include using https://whois.domaintools.com (opens in a new tab) to get more information
about the fullstackacademy.com domain. It can also include going to the official LinkedIn
page of Fullstack Academy and viewing the profiles of FullStack Academy employees.
STEP 1: Please open your browser and search for the site:
“https://whois.domaintools.com”.
STEP 2: Now click on “VIEW OPEN ROLES”. This will lead to the
viewing some job descriptions.
STEP 3: Open the web-browser and search for
“https://builtwith.com/”
to know about the technologies running in the
“fullstackacademy.com”
3. A physical penetration test of Fullstack Academy that was performed before yielded an
admin credential with the username of “Administrator” and the password “fstackacademy”.
Set up a credentialed scan for the Windows system and run the scan with these credentials.
Immediate Actions:
System Hardening: