Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There are a number of procedures that can be used in the process of footprinting, or passively obtaining information about the Universi
...
Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There are a number of procedures that can be used in the process of footprinting, or passively obtaining information about the University™s systems. Footprinting is simply information gathering that is performed carefully to avoid detection by the victim. We want to gather as much information as possible, without giving away our intentions or that our presence is even involved. Our common sources of gathering information come from a diverse group of sources which include the University™s Web site, financial reports, Google searches, social networks, and other similar technologies. A lot of important information can be passively collected and used in a direct attack or to reinforce other attacks targeted at the University. We begin our footprinting phase of the hacking and information gathering process by taking the following steps: (Oriyano 2011) ïŽGathering information ïŽDetermining the network range ïŽIdentifying active machines ïŽFinding open ports and access ïŽDetecting operating systems ïŽUsing the fingerprinting services ïŽMapping the network We can begin our process by obtaining some basic domain information. Currently there are many tools available that can be used for acquiring this information, and each of these tools will provide valuable information pulled from domain registration. These tools include the following: (Oriyano 2011) ïŽWhois: A query and response protocol that is widely us. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]