Preview

lab7assessment Essay Example

Powerful Essays
Open Document
Open Document
924 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab7assessment Essay Example
38

LAB #3 | Perform Data Gathering and Footprinting on a Targeted Website

LAB #3 – ASSESSMENT WORKSHEET

Perform Data Gathering and Footprinting on a Targeted Website
Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:

Overview
In this lab, you targeted an organization with an e-commerce website and performed data gathering and footprinting for that site. You collected public domain information about an organization’s website by making use of Google hacking techniques, downloading the Sam Spade reconnaissance-gathering tool, and using nslookup and tracert, similar DOS command tools packaged with Microsoft® Windows. You also researched public domain sites such as IANA’s WHOIS tool to obtain public domain information about the targeted website. Finally, you performed Google hacking research on the targeted organization’s e-commerce website to identify other shared information.

Lab Assessment Questions & Answers
1. Which reconnaissance tool comes with Microsoft® Windows that can provide reconnaissance-gathering

data and can be initiated from the DOS command prompt? What useful information does this query provide? name and the IP address associated with the source you are targeting.

2. What is the difference between ARIN, RIPE, and IANA? What regions of the world do these domain name

registry organizations cover?
The internet assigned numbers authority (IANA) delegates internet resources to the regional internet registries which are what ARIN (American Registry for Internet Numbers) and RIPE (Reseaux IP Europeens Network Coordination Centre)

ARIN covers the United States, Canada, several parts of the Carribean and Antartica.

RIPE covers Europe, Russia, the MIddle East, and central Asia.

38566_LMxx_Lab3.indd 38

8/22/12 11:26 AM

Assessment Worksheet

39

3. What other functions can be completed using the Sam Spade utility?

You can do Zone Transfers, SMTP relay checks, scan addresses, crawl

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Here we have plugged in the values into our formula. When solving we do order of operations first and we will solve exponents first.…

    • 652 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    COMP230 Wk1 Lab Report

    • 819 Words
    • 6 Pages

    DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1…

    • 819 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The American Registry for Internet Numbers (ARIN) is the nonprofit corporation responsible for managing Internet number resources (IPv4 and IPv6 addresses and Autonomous System Numbers) for Canada, many Caribbean and North Atlantic islands and the United States.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Comp230 Week 1 Lab Report

    • 941 Words
    • 4 Pages

    DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1…

    • 941 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Domain Name System is a classified identification system for processors of any source joining in the Internet. It connections numerous evidence with domain terms allocated to such applicants. Most essentially, it interprets domain names significant to individuals into the numerical identifiers related with networking equipment for the resolution of finding and addressing these procedures world-wide. A frequently used similarity to clarify the Domain Name System is that it helps as the phone book for the Internet by interpreting human-friendly computer hostnames into IP addresses.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    a. American Registry for Internet Numbers (ARIN): ARIN manages the distribution of Internet number resources, including IPv4 and IPv6 address space and AS numbers.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In Bend it Like Beckham, the main character, Jess is faced with many cultures. These cultures pull her mind in two opposite directions. One by pleasing her mom and becoming a Punjabi women and the other being a good soccer player. The movie follows her internal and external conflicts, where she struggles to make a decision regarding her life. Jess struggles between these two conflicts and is very emotional through the whole movie.…

    • 514 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kizza chapter 6

    • 329 Words
    • 2 Pages

    The article “The Yin and Yang of Copyright and Technology” discusses copyright laws and the Rojadirecta Case in which Congress made it possible for the federal government to seize domain names associated with Websites where allegedly infringing behavior was taking place or being facilitated.…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet Number Resources

    • 381 Words
    • 2 Pages

    a) ARIN –Provides services related to the technical coordination and management of Internet number resources. Supports the operation of the internet through the management of internet number resources and coordinates the development of policies for the management of IP number resources. They provide services for technical coordination and management of internet number resources in its respective service region. This includes IP address space allocation & ASN allocation, transfer and record maintenance.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Public E Procurement

    • 19840 Words
    • 80 Pages

    IDA (http://europa.eu.int/ispo/ida) is a European Commission driven strategic initiative using advances in information and communication technology to support rapid electronic exchange of information between Member State administrations. The objective is to improve Community decision-making, facilitate operation of the internal market and accelerate policy implementation. Its mission is to co-ordinate the establishment of transEuropean telematic networks by: Promoting implementation of sectoral networks in priority areas Developing network interoperability measures Extending network benefits to EU industry and citizens Co-operating with Member States authorities and Community services Promoting convergence towards a common telematic interface. If you would like to comment on this report or related issues, please e-mail to ida-central@cec.eu.int.…

    • 19840 Words
    • 80 Pages
    Powerful Essays