Lab 1

Only available on StudyMode
  • Download(s) : 126
  • Published : January 28, 2013
Open Document
Text Preview
LAB 1: Footprinting a Network
One of the most astounding side-effects of the Internet is how readily accessible information is about individuals, organizations, and computer systems. This assignment is designed to give you some experience in obtaining this information. Materials Needed:  Computer  Internet connection with “Ping” command available Activity 

Use “Ping” command to determine the IP address of www.google.com and www.uhv.edu e.g. launch the command prompt and type in “ping www.google.com” you will get the ip address of Google as well as the response time.



Determine who administers these computers and any other information readily available. You may use any websites or tools like ARIN, Neotrace, Whois (http://www.networksolutions.com/en_US/whois/ ), or other open source public information. Describe how you found the information. You now have all kinds of information that would allow you to take advantage of vulnerabilities at that site. Download NetBrute from http://www.rawlogic.com/products.html or from the software uploaded in the folder directly. Whether you are using a residential network or on campus, the network operator does monitor the networks very tightly, so you must be careful using this tool. Students have been locked out of the university network and servers when they used this carelessly. Inspect www.uhv.edu using the PortScan feature of NetBrute. If you are not familiar with the setup, please download and review the demo video first.





Web servers are notorious for containing large numbers of vulnerabilities. Find out which of the hosts in the same subdomain as www.uhv.edu have web servers running. Select a few of these and try and determine what the server is used for. Describe what you found and how you found it.

Questions
1. Discuss the information that you found about www.google.com, www.uhv.edu, as well as other you are interested. 2. Discuss ways that a hacker would be able to exploit this information....
tracking img