Data Gathering and Footprinting on a Targeted Website
Instructions (Assignment 1)
To demonstrate your understanding of core concepts and procedures presented in this unit, you are required to complete the lab linked below.
1. Explain why the Whois tool is useful.
2. List some useful functions that are included in Sam Spade. Which do you think you will be mostly likely to use?
3. Explain what output is generated by the tracert command. Provide a scenario where you might use tracert as an investigative tool.
4. Provide a brief description of Sam Spade. Do you think Sam Spade is useful to security practitioners? Do you think hackers might find Sam Spade equally useful?
5. Discuss the privacy considerations in regards to Whois information.
6. Describe the purpose of footprinting.
7. List the primary technical contacts for the three domains.
Refer to the Data Gathering and Footprinting on a Targeted Website scoring guide to ensure that your work meets the grading criteria for this assignment.
Submit your assignment by midnight Sunday (CST).
Submission Requirements
· Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional.
· Format: Typed, double-spaced lines.
· Font: Times New Roman, 12 points.
[u03a2] Unit 3 Assignment 2
Tools to Explore Domain Information (Assignment 2) 4–5 pages
Introduction
During your reading this week, you learned about the significance of footprinting to hackers. Hackers take everyday information and network tools and distort their purpose to aid in their hacking activities. They compile the information they learn during the footprinting phase to increase the effectiveness of their attacks. Understanding how attackers use these tools is an important first step in mitigating attacks.
Instructions
In this assignment, write a 4–5 page paper in which you:
· Describe the most common tools used by both malicious and ethical hackers to conduct footprinting.
· Describe why ethical hackers explore network information before carrying out an investigation.
· Analyze the primary differences between Nslookup and Whois in assessing domain information.
· Explain how an ethical hacker uses the information derived by use of Nslookup and Whois to mitigate network connectivity issues.
Your assignment must be supported by a minimum of three recent, peer-reviewed references. Citations and references must be formatted using current APA style.
Structure your report as follows:
· Title page.
· Introduction.
· The main body (at least three pages); use headings to identify individual sections.
· Summary and conclusion.
· References page. Capella academic integrity standards must be strictly followed.
Submission Requirements
· Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional
· References: Include a minimum of three recent, peer-reviewed references.
· APA style: Citations and references must be formatted using current APA style.
· Length of the report: A minimum of four typed, double-spaced pages, excluding the title page and references page.
· Font: Times New Roman, 12 points.