Buy Research Papers – Hacker Tools and Techniques (Footprinting) Assignment
Ethics and Code of Conduct:
The students enrolled in this course are aware that the hardware, software, tools, and applications presented and used are for instructional and education purposes only. The students enrolled in this course are required to conform to University code of conduct and policies. This lab asks you to perform search queries on publicly accessible data only.
Part-1:
Learning Objectives and Outcomes:
Upon completing this lab, students will be able to perform the following tasks:
– Perform live data gathering and footprinting of a targeted organization and its website
– Gather valuable public domain information of the targeted organization and its website
– Assess what information is available publicly and what information should not be in the public domain for that organization
– Perform Google hacking research to identify known user logons and other website vulnerabilities
Procedures:
As explained in your textbook, discussed and demonstrated in class:
– Visit the targeted organization’s website and conduct reconnaissance data gathering
– Visit the targeted organization’s e-commerce website
– Perform Google hacking research
– Capture traceroute and nslookup footprinting data
– Capture public domain information using IANA Whois
– Useful information may include: physical locations, phone numbers, name of employees, current events
– Perform DNS enumeration on the targeted organization and e-commerce domain
– Capture data for known Web servers, email servers and possible development environments
Deliverables:
– Data Gathering and Footprinting Research report which includes:
• Description of the targeted website/organization
• IANA Whois
• ARIN Whois
• Traceroute
• Nslookup
• Servers identified
• Google hacking research data found
• Security countermeasures identified
• Assessment of available public domain information
• Recommendations you would make to the targeted organization
Part-2:
DShield.org provides a listing of ports that are being scanned across a variety of networks and systems.
This lab requires you to list the top three ports of two different categories—top port category and rising port category—and explain why these ports are the top ports. For example:
Port 443: This is the secure Hypertext Transfer Protocol Secure (HTTPS) port, and scanning of this may indicate vulnerability in secure Web services.
You may search Web sites such as http://www.portsdb.org.uk/, or other listings of common services for unfamiliar ports.
Complete the following steps for this assignment:
1. Visit the DShield.org Web site’s reports page at http://www.dshield.org/reports.html.
2. Review the Top 10 Ports chart on the page.
3. Select the top three ports from the By Targets category.
4. Scroll down and click on Trends button that takes you to another screen.
5. Review the chart displaying Top 10 Rising Ports and select the top three rising ports.
6. List the six ports you selected and explain what services are commonly associated with these ports and the reasons for them being the top most ports in each category.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT!
Is this the question you were looking for? If so, place your order here to get started!