Preview

Information Gathering

Satisfactory Essays
Open Document
Open Document
359 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Gathering
Target : http://www.nytimes.com/
INTRODUCTION
Information gathering is the act of collecting information. In network security, it means getting information about an enemy that we would like to attack. There are 4 steps to do so. First and foremost, social engineering. Social engineering means getting information verbally by merely asking, or the electronic way of it is known as phishing. Secondly, by using published information. This is gained by searching the particular target online via Google search to obtain any information regarding the target. Thirdly, by using port scanning. We can download the tools and find the ports used by the target. Lastly, by using network mapping. Network mapping is the study of the physical connectivity of networks and often attempts to determine the servers and operating systems run on networks.

OBJECTIVES
The objectives of information gathering are: * The organization’s work planning will be support to become more fully inclusive. * Used to get all the information that the company or organization using many steps.

1. Social engineering gives us information about who to contact if we were to send any malicious threat to the site. For example, we obtained the phone number ((212) 556-7777) or the email (timesdigest@nytimes.com) to gain access to their system.

2. Using published information that is the url itself http://www.nytimes.com/. We ping the site by using command prompt to find out the IP address.

Procedure: i. Open CMD command ii. Ping the website address “ping nytimes.com” iii. Click Enter button iv. The command will display the ip adress of the site.

3. Using port scanning

Procedure: i. Insert IP address of the web site “170.149.168.130” using the port scanner tool. ii. Click on the Port Scan button. iii. The tool display port that used by the owner in the site. 4. Network mapping is the process of discovering the IP address or if possible their

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    References: Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP…

    • 440 Words
    • 2 Pages
    Good Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    address, and presses Enter. The browser displays a new web page. What part of the web address…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    CMIT Quiz

    • 25806 Words
    • 172 Pages

    Combo with "Combo with "TestOut PC Pro A+ 220­801 / 220­802 | Troubleshooting" and 7 others" and 1 other flashcards | Quizlet…

    • 25806 Words
    • 172 Pages
    Powerful Essays
  • Powerful Essays

    Information Methods

    • 4779 Words
    • 20 Pages

    I declare that ( the first four boxes must be completed for the assignment to be accepted):X This assignment does not contain any material that has previously been submitted for assessment at this or any other university. X This is an original piece of work and no part has been completed by any other student than signed below. X I have read and understood the avoiding plagiarism guidelines at http://www.swinburne.edu.au/ltas/plagiarism/students.htm and no part of this work has been copied or paraphrased from any other source except where this has been clearly acknowledged in the body of the assignment and included in the reference list. X I have retained a copy of this assignment in the event of it becoming lost or damaged. □ (optional) I agree to a copy of the assignment being retained as an exemplar for future students (subject to identifying details being removed).…

    • 4779 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Lesson 1

    • 457 Words
    • 2 Pages

    T/ 4 Name resolution is the process of locating the IP address equivalent for a given name.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Use

    • 777 Words
    • 4 Pages

    In today’s business environment information is the most important asset a business has, this information helps to support, maintain, develop and track its daily activities. The next logical step is implementing a system that is conducive and geared towards this goal. With the help of its information system, and its information technology department, managers, sales people, the operations department and others with access to this information have a handy tool to help them do their work on a daily basis. The structure of the information system is paramount on how accessible this information is to the people that depend upon it to complete their normal workday. The managers and IT department work closely together to agree upon and decide on an information system that will be feasible to the business itself, thus setting up a system that will be beneficial to the business itself.…

    • 777 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information Management

    • 696 Words
    • 3 Pages

    1. Think about the different disciplines addressed in the lecture. How are the disciplines of information management, information technology, and informatics related? How do they differ?…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    package lab4.t1; import java.net. *; import java.io. *; public class Lab4T1 public static void main(String[] args) throws Exception { { URL aURL = new URL("http://example.com:80/docs/books/tutorial" + "/index.html?name=networking#DOWNLOADING"); System.out.println("protocol = " + aURL.getProtocol()); System.out.println("authority = " + aURL.getAuthority()); System.out.println("host = " + aURL.getHost()); System.out.println("port = " + aURL.getPort()); System.out.println("path = " + aURL.getPath()); System.out.println("query = "…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1. Log in to the Windows 2003 machine with a username of Administrator and a password pof P@ssw0rd.…

    • 1678 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    19. Enter #show ip int brief to show what ports are assigned to each ip and if they are up and connected. (To verify the work done has worked)…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Retrieval

    • 3389 Words
    • 14 Pages

    30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS 2008) (August 2008) 1230–1233 16. : Dermnet: the dermatologist’s image resource (2007) Dermatology Image Altas, available at: http://www.dermnet.com/. 17. Cohen, B.A., Lehmann, C.U.: Dermatlas (2000-2009) Dermatology Image Altas, available at: http://dermatlas.med.jhmi.edu/derm/. 18. Johr, R.H.: Dermoscopy: alternative melanocytic algorithms–the abcd rule of dermatoscopy, menzies scoring method, and 7-point checklist. Clinics in Dermatology 20(3) (May-June 2002) 240–247 19. Ohta, Y.I., Kanade, T., Sakai, T.: Color information for region segmentation. Computer Graphics and Image Processing 13(1) (July 1980) 222 – 241 20. Haralick, R.M., Shanmungam, K., Dinstein, I.: Textural features for image classification. IEEE Transactions on Systems, Man and Cybernetics 3(6) (1973) 610–621 21. Unser, M.: Sum and difference histograms for texture classification. IEEE Transactions on Pattern Analysis and Machine Intelligence 8(1) (January 1986) 118–125 22. Munzenmayer, C., Wilharm, S., Hornegger, J., Wittenberg, T.: Illumination invariant color texture analysis based on sum- and difference-histograms. In: 27th, Vienna, Austria, August 31 - September 2, 2005. Springer BibRef LNCS3663 German Pattern Recognition Symposium. (2005) 17–24 23. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading, MA (1989)…

    • 3389 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    this blog is disign to for beginer who want to be a hacker ........ & also we trying to solve general computer related problem.. i.e we want to create new era of computer hacking basics & much more…

    • 11363 Words
    • 54 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Science

    • 291 Words
    • 2 Pages

    Information science is an interdisciplinary science primarily concerned with the analysis, collection, classification, manipulation, storage, retrieval and dissemination of information.[1]Practitioners within the field study the application and usage of knowledge in organizations, along with the interaction between people, organizations and any existing information systems, with the aim of creating, replacing, improving or understanding information systems. Information science is often (mistakenly) considered a branch of computer science. However, it is actually a broad, interdisciplinary field, incorporating not only aspects of computer science, but often diverse fields such as archival science, cognitive science, commerce,communications, law, library science, museology, management, mathematics, philosophy,public policy, and the social sciences.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays