How-footprinting-techniques-would-be-used-by-a-hacker-to-gain-information-access-to-the-network-

There are numerous freely available tools that allow hackers to gather a considerable amount of information about organizations via their websites. In this assignment, you will be utilizing some of these tools.

Select a Middle Eastern company with a website. Utilize the WHOIS command in the DOS terminal and record the data found. Things to consider would be:

  • The physical location, email addresses of contacts shown, applicable phone numbers and all Name servers
  • NSLookup command for IP addresses and MX records
  • Trace route information
  • DNS zone transfer information records
  • Ping sweeps, UDP scans, operating system identification, etc.

All of this can be performed on a DOS window or terminal. After performing the above footprinting techniques, write a short paper discussing how these techniques would be used by a hacker to gain information access to the network.

Your paper should be 1-2 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It must follow academic writing standards and APA style guidelines, as appropriate.

Kindly submit the paper to the Originality Check tool.

Please note that the proportion of similarity must be less that 25%

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.