Business > CASE STUDY > Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There (All)
Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There are a number of procedures that can be used in the process of footprinting, or passively obtaining informatio... n about the University™s systems. Footprinting is simply information gathering that is performed carefully to avoid detection by the victim. We want to gather as much information as possible, without giving away our intentions or that our presence is even involved. Our common sources of gathering information come from a diverse group of sources which include the University™s Web site, financial reports, Google searches, social networks, and other similar technologies. A lot of important information can be passively collected and used in a direct attack or to reinforce other attacks targeted at the University. We begin our footprinting phase of the hacking and information gathering process by taking the following steps: (Oriyano 2011) ïŽGathering information ïŽDetermining the network range ïŽIdentifying active machines ïŽFinding open ports and access ïŽDetecting operating systems ïŽUsing the fingerprinting services ïŽMapping the network We can begin our process by obtaining some basic domain information. Currently there are many tools available that can be used for acquiring this information, and each of these tools will provide valuable information pulled from domain registration. These tools include the following: (Oriyano 2011) ïŽWhois: A query and response protocol that is widely us. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 3 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 06, 2022
Number of pages
3
Written in
This document has been written for:
Uploaded
Aug 06, 2022
Downloads
0
Views
60
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·