Reference no: EM132440195
Assignment 1. Data Gathering and Footprinting on a Targeted Website
Instructions (Assignment 1)
To demonstrate your understanding of core concepts and procedures presented in this unit, you are required to complete the lab linked below.
1. Explain why the Whois tool is useful.
2. List some useful functions that are included in Sam Spade. Which do you think you will be mostly likely to use?
3. Explain what output is generated by the tracert command. Provide a scenario where you might use tracert as an investigative tool.
4. Provide a brief description of Sam Spade. Do you think Sam Spade is useful to security practitioners? Do you think hackers might find Sam Spade equally useful?
5. Discuss the privacy considerations in regards to Whois information.
6. Describe the purpose of footprinting.
7. List the primary technical contacts for the three domains.
Refer to the Data Gathering and Footprinting on a Targeted Website scoring guide to ensure that your work meets the grading criteria for this assignment.
Assignment 2. Tools to Explore Domain Information
Introduction
During your reading this week, you learned about the significance of footprinting to hackers. Hackers take everyday information and network tools and distort their purpose to aid in their hacking activities. They compile the information they learn during the footprinting phase to increase the effectiveness of their attacks. Understanding how attackers use these tools is an important first step in mitigating attacks.
Instructions
In this assignment, write a 4-5 page paper in which you:
1. Describe the most common tools used by both malicious and ethical hackers to conduct footprinting.
2. Describe why ethical hackers explore network information before carrying out an investigation.
3. Analyze the primary differences between Nslookup and Whois in assessing domain information.
4. Explain how an ethical hacker uses the information derived by use of Nslookup and Whois to mitigate network connectivity issues.