This hands-on lab demonstrates how to conduct “Footprinting of a network” The best way to ensure your infrastructure is secure is to understand the steps an intruder may use to footprint a reconnaissance a network.
Choose one of the below paths Easy or Hard provide screenshots and a summary of your findings, “If you do both, you will receive extra credit.”
This exercise is exploratory (no right or wrong answer)
GUI – Easy
1. Go to dnschecker.org input “www.motionborg.com”
Go through the text records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a word document copy and paste the information (Blue Text) of all the Text Record information
2. Use Sam Spade (https://www.majorgeeks.com/index.php?ct=files) to get more information about the network, what ever you find put it in the word document as well. Sam Spade Video (https://www.youtube.com/watch?v=U6QxBKuWLgQ&feature=youtu.be) (If you do not like this video Google Sam Spade Footprinting)
3. Use Command Prompt: Run Trace-route on www.motionborg.com to get more details see document https://kb.intermedia.net/article/682
4. Use Command Prompt to Use nslookup see document https://kb.intermedia.net/Article/819
Answer below questions?
Is the site www.motionborg.com secure with SSL? is the site vulnerable to script injection attacks?
Look at the source code does anything stand out to you?
What did you find out about the network?
Are other networks connected to it?
Is it a Linux or Windows server
Based on your findings what are some vulnerabilities
Note: It is really easy to get stuck in the Matrix, do not dive to in-depth – just the surface of gathering information.
The post Lab Assignment appeared first on EssayBishops.
Writing quality papers is a TOP priority. One expert takes one order at a time.
The service package includes topic brainstorm, research, drafting, proofreading, plagiarism check, citation formatting, and revisions.
We appreciate how valuable your time is. Hence, we make sure all custom papers are 100% original and delivered within the agreed time frameRead more
Each paper is written from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
We see it as our duty to follow all instruction the client provides. If you feel the completed paper does not meet your exact requirements, we will revise the paper if you let us know about the problem within 14 business days from the date of delivery.Read more
Your email is safe, we use your personal data for legal purposes only and in accordance with personal data protection law. Your payment details are also secure, as we use only reliable payment systems.Read more
You can easily contact us with any question or issues you need to be addressed. Also, you have the opportunity to communicate directly with assigned writer, e-mail us, submit revision requests, chat with us online, or call our toll-free on our site. We are always available to our customers.Read more