Free Essay

Lab7

In:

Submitted By kgon312
Words 918
Pages 4
38

LAB #3 | Perform Data Gathering and Footprinting on a Targeted Website

LAB #3 – ASSESSMENT WORKSHEET

Perform Data Gathering and Footprinting on a Targeted Website
Course Name and Number: Student Name: Instructor Name: Lab Due Date:

Overview
In this lab, you targeted an organization with an e-commerce website and performed data gathering and footprinting for that site. You collected public domain information about an organization’s website by making use of Google hacking techniques, downloading the Sam Spade reconnaissance-gathering tool, and using nslookup and tracert, similar DOS command tools packaged with Microsoft® Windows. You also researched public domain sites such as IANA’s WHOIS tool to obtain public domain information about the targeted website. Finally, you performed Google hacking research on the targeted organization’s e-commerce website to identify other shared information.

Lab Assessment Questions & Answers
1. Which reconnaissance tool comes with Microsoft® Windows that can provide reconnaissance-gathering

data and can be initiated from the DOS command prompt? What useful information does this query provide?

name and the IP address associated with the source you are targeting.

2. What is the difference between ARIN, RIPE, and IANA? What regions of the world do these domain name

registry organizations cover?
The internet assigned numbers authority (IANA) delegates internet resources to the regional internet registries which are what ARIN (American Registry for Internet Numbers) and RIPE (Reseaux IP Europeens Network Coordination Centre)

ARIN covers the United States, Canada, several parts of the Carribean and Antartica.

RIPE covers Europe, Russia, the MIddle East, and central Asia.

Assessment Worksheet
3. What other functions can be completed using the Sam Spade utility?

39

You can do Zone Transfers, SMTP relay checks, scan addresses, crawl

websites, browse the web for the domain, check cancels, do a fast trace route on the domain, a slow traceroute on the domain, a S-lang

command, decode the URL, or parse email headers.

4. What is the purpose of the traceroute command? What useful information does traceroute provide? How

can this information be used to attack the targeted website?

It is a way to find out what routers you go through on the internet to get to

a specific destination on the internet. It provides the information on how to get to the destination system. This is helpful by letting the

attacker know exactly where to go in order to get valuable info.
5. What important information can be gleaned from a WHOIS record for a website?

You are able to get administrative and technical contacts for the website

along with contact numbers, faxes, addresses, the date when the

domain was registered, and the expiration date.

6. How many different WHOIS profiles are pre-loaded in the Sam Spade utility?

3
Perform Data Gathering and Footprinting on a Targeted Website

100

7. Is Sam Spade an intrusive tool? What is your perspective on the use of a freeware utility such as Sam

Spade?

Not it is not intrusive. Sam Spade is just a security tool.

40

LAB #3 | Perform Data Gathering and Footprinting on a Targeted Website
8. What do you think companies and organizations should do with regard to access to WHOIS information

in the public domain?

The companies and organizations can opt out of displaying information

that can invite attackers into their systems in the future. They could

also use the information to get contact information from other

companies.

9. What icon or function in Sam Spade downloads the entire HTML code of the targeted website?

The web browsing tool in Sam Spade downloads he entire HTML code of

the targeted website.

10. Why would someone use a proxy to perform data gathering from a remote website?

Someone would use a proxy to perform data gathering from a remote

website because it will make it harder to track who the attacker is.

11. If you wanted to find out if a person has been arrested or has a court date for anything specific, what

information would you need to Google?

You would need to Google the county-clerk's office to where the person may

have committed an offense and all legal information such as arrest and court dates will be displayed.

12. How can you estimate the number of employees who work in an organization’s remote office or facility?

You may be able to find the information online, if not, you can call and try to

see if the people at the company will provide the information for you.
Another way is through educated guessing based on how many floors,

how many buildings, and how large the buildings are.

Assessment Worksheet
13. What is the goal when trying to use a search engine for data gathering or footprinting?

41

The goal is to learn about all aspects of an organization's security, their intranet

set up, remote access capabilities, and the intranet/extranet presence.

As an organization, you can hire someone to try and find all the weakness and report them to you to further strengthen the security of your company.
14. What is Google hacking?

It is a computer hacking technique that uses the Google search bar and other

Google applications in order to find security issues in the configuration and computer code that websites use.

15. What is the Google Hacking Database (GHDB)?

It is an authoritative source for querying the Google search engine. It allows

direct mapping which lets penetration testers to quickly determine whether a website has a public available exploit.

3
Perform Data Gathering and Footprinting on a Targeted Website

Similar Documents

Premium Essay

Lab7

...Lab 7: Repetition Structures I This lab accompanies Chapter 5 (pp. 163-183 and pp. 196-201) of Starting Out with Programming Logic & Design. Name: ___Jeffry McGee_____ Lab 7.1 –Condition Controlled with While and Do-While Loops: Pseudocode |Critical Review | | | |A repetition structure causes a statement or set of statements to execute repeatedly. | | | |Repetition structures are used to perform the same task over and over. | | | |Repetition structures are commonly called loops | | | |A condition-controlled loop uses a true/false condition to control the number of times that it repeats. | | ...

Words: 1412 - Pages: 6

Premium Essay

Bios105-Lab7

...Reproductive System worksheet Name: Michael Duncan Before answering the questions below, log in to ADAM and review the following Clinical Animations about the Reproductive System a. Conception b. Fetal Development c. Formation of twins d. vasectomy Next, view the clinical illustration a. Ectopic Pregnancy Answer the following questions 1. How is a vasectomy performed? Be sure to cite the specific anatomical structures involved. How does this prevent pregnancy? |A vasectomy is procedure used to prevent a man from ejaculating sperm. There are two methods for performing this procedure. The | |conventional vasectomy uses one or more small incisions in the scrotum used to access the vas deferens. They take a small section | |out of both vas deferens and either tie or carterize the ends then stitch the cuts. The second way is called no-scalpel vasectomy | |where a small hole is punctured in the scrotum in which the vas deferens is pulled out and severed then the vas deferens are tied | |or catrtarized. No stitches are required since the holes are so small. The man will still function normally with discharge during | |orgasm just no sperm will be ejaculated. | 2. Where does fertilization take place? | | |Fertilization...

Words: 430 - Pages: 2

Premium Essay

Lab7 Wide Area Networks

...NT1210 Wednesday am | Chapter 7 Wide-Area Networks | | | David | 4/30/2014 | | Exercise 7.1.1: Owning the entirety of a WAN is impractical for an organization because there are no limitations and they can be custom built to the organization. It is favorable for the organization to maintain a LAN for expansion purposes. Exercise 7.1.2: On a WAN there is no absolute limit for the distance of a leased line. Table 7-1 WAN Physical Media Media | Infrastructure | Summary | UTP | Phone lines | Uses copper lines between all locations, limited speed with the lines. Already in place, can be very cheap to use | Coaxial | Television cable | Must run cable to all locations, can carry much higher speeds than Telco. Is a little more expensive to run. Needs boosters at specific distances | Fiber-optic | Glass cables with POP’s at specific distances | Uses a customized infrastructure to run dedicated connections: this is a costly option | Electric power lines | Power lines. They are everywhere and the infrastructure is already there | This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already | Table 7-2 WAN Wireless Media Media | Summary | Satellite | Not very fast, has a delay of about 1 second, very costly to use. Uses a star topology | Imax (Worldwide Interoperability for Microwave Access) | This has 75Mbps speeds and can transmit for distances up to 30 miles. It is...

Words: 784 - Pages: 4

Premium Essay

Boolean

...Functions This lab accompanies Chapter 6 of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 7.1 – Functions and Pseudocode Critical Review You have been coding with modules in pseudocode and functions when using Python. You modules in pseudocode can be made into functions by returning a value. A function is a special type of module that returns a value back to the part of the program that called it. Most programming languages provide a library of prewritten functions that perform commonly needed tasks. Library functions are built into the programming language and you can call them as needed. They are commonly performed tasks. Help Video: View the tutorial video titled, "lab7-1.wmv" to assist you in completing this lab assignment. Writing Your Own Function that Returns an Integer Step 1: A function contains three parts: a header, a body, and a return statement. The first is a function header which specifies the data type of the value that is to be returned, the name of the function, and any parameter variables used by the function to accept arguments. The body is comprised of one or more statements that are executed when the function is called. In the following space, complete the following: (Reference: Writing Your Own Functions, page 225). a. Write a function with the header named addTen. b. The function will accept an Integer variable named number. c. The function body will ask the user...

Words: 2530 - Pages: 11

Free Essay

Auditing

...Timothy Hicks IS4680 Lab7 Auditing the LAN-to-WAN Domain for Compliance 1. People threats, Viruses and related threats, physical threats, pc vulnerability, the pc virus, lan access and internetworking. 2. An access control list (ACL) is a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee. ACLs contain access control entries (or ACEs) that describe the permissions associated with objects and object properties. For a security principal, an ACE defines the rights which are denied, allowed and audited for a particular security principal. 3. A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. An example of this is a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers. 4.Two examples of an enclave requirement are 1) a set of resources requires uninterrupted 24/7 availability. And 2) Proprietary information must be shared must be shared among several computers. 5.SPI is a basic firewalling feature...

Words: 653 - Pages: 3

Free Essay

Music

...|节次时间 |星期一 |星期二 |星期三 |星期四 |星期五 | |上午 |1-2节 |FtoF Classes 5、6、7、8、15 |FtoFClasses 5、6、7、8、13、14、15、16 |FtoFClasses 5、6、7、8 |FtoF Classes |FtoF Classes 5、6、7、8、13、 | | |8:15 |406.407.408.409.403 |406.407.408.409.. 401.304.403.405. |406.407.408.409. |5、6、7、8、13、14、15、16 |14、16 | | |至 |Language Lab 13、14 |Language Lab 1、2 |Language Lab 15、16 |406.407.408.409.. 401.304.403.405. |406.407.408.409.. 401.304. 405. | | |09:50 |AIEN机306 |AIEN机306 |AIEN机306 |大学英语 1-4 5102 |Language Lab 11、12 | | | | |高等数学 9-12 5101 |体育 13、14 体育馆 |高等数学 9-12 5101 |AIEN机306 | | | | |体育3、4 体育馆 |微观经济学 9-12 5102 | ...

Words: 935 - Pages: 4

Premium Essay

Biology

...AP Biology Exam Review: Lab Essays At least one essay (FRQ) on the exam will be based on an AP laboratory. To prepare for this question, review the objectives for all twelve laboratory exercises. The College Board does not necessarily expect that you have completed that lab, but rather that you have investigated the objectives of the lab. You may be asked to “design an experiment to determine….” You don’t necessarily need to create a new lab; if you have done an activity that would answer the question, simply describe it. For a good response, you should include the following. 1. State a hypothesis [as an “if…..(conditions), then….(results)” statement] Be sure your hypothesis is testable. 2. Identify the variable factor. 3. Identify the control. Be certain to explain the control for the experiment. 4. Hold all other variables constant. 5. Manipulate the variable. 6. State how you would measure the results. 7. Discuss the expected results. Relate the results to your hypothesis. 8. Include steps to replicate or verify. You may be asked to graph data. Be sure to use a graph that is appropriate for you data. Bar graphs are used when data points are discrete (not related to one another), while line graphs are used with the data are continuous. If there is a data point at zero, be certain to extend your line to 0, but do not extend the line to 0 if there is no data point at zero. Other points to keep in mind: ...

Words: 2702 - Pages: 11