#Sales Offer!| Get upto 25% Off:

Data Gathering and Footprinting on a Targeted Website

Instructions (Assignment 1)

To demonstrate your understanding of core concepts and procedures presented in this unit, you are required to complete the lab linked below.

1. Explain why the Whois tool is useful.

2. List some useful functions that are included in Sam Spade. Which do you think you will be mostly likely to use?

3. Explain what output is generated by the tracert command. Provide a scenario where you might use tracert as an investigative tool.

4. Provide a brief description of Sam Spade. Do you think Sam Spade is useful to security practitioners? Do you think hackers might find Sam Spade equally useful?

5. Discuss the privacy considerations in regards to Whois information.

6. Describe the purpose of footprinting.

7. List the primary technical contacts for the three domains.

Refer to the Data Gathering and Footprinting on a Targeted Website scoring guide to ensure that your work meets the grading criteria for this assignment.

Submit your assignment by midnight Sunday (CST).

Submission Requirements

· Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional.

· Format: Typed, double-spaced lines.

· Font: Times New Roman, 12 points.

[u03a2] Unit 3 Assignment 2

Tools to Explore Domain Information (Assignment 2) 4–5 pages

Introduction

During your reading this week, you learned about the significance of footprinting to hackers. Hackers take everyday information and network tools and distort their purpose to aid in their hacking activities. They compile the information they learn during the footprinting phase to increase the effectiveness of their attacks. Understanding how attackers use these tools is an important first step in mitigating attacks.

Instructions

In this assignment, write a 4–5 page paper in which you:

· Describe the most common tools used by both malicious and ethical hackers to conduct footprinting.

· Describe why ethical hackers explore network information before carrying out an investigation.

· Analyze the primary differences between Nslookup and Whois in assessing domain information.

· Explain how an ethical hacker uses the information derived by use of Nslookup and Whois to mitigate network connectivity issues.

Your assignment must be supported by a minimum of three recent, peer-reviewed references. Citations and references must be formatted using current APA style.

Structure your report as follows:

· Title page.

· Introduction.

· The main body (at least three pages); use headings to identify individual sections.

· Summary and conclusion.

· References page. Capella academic integrity standards must be strictly followed.

Submission Requirements

· Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional

· References: Include a minimum of three recent, peer-reviewed references.

· APA style: Citations and references must be formatted using current APA style.

· Length of the report: A minimum of four typed, double-spaced pages, excluding the title page and references page.

· Font: Times New Roman, 12 points.

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!