Business > CASE STUDY > Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There (All)

Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There

Document Content and Description Below

Unit 3 Assignment 1.docx IS 4560 Unit 3 Assignment 1 Information Gathering Plan There are a number of procedures that can be used in the process of footprinting, or passively obtaining informatio... n about the University™s systems. Footprinting is simply information gathering that is performed carefully to avoid detection by the victim. We want to gather as much information as possible, without giving away our intentions or that our presence is even involved. Our common sources of gathering information come from a diverse group of sources which include the University™s Web site, financial reports, Google searches, social networks, and other similar technologies. A lot of important information can be passively collected and used in a direct attack or to reinforce other attacks targeted at the University. We begin our footprinting phase of the hacking and information gathering process by taking the following steps: (Oriyano 2011) Gathering information Determining the network range Identifying active machines Finding open ports and access Detecting operating systems Using the fingerprinting services Mapping the network We can begin our process by obtaining some basic domain information. Currently there are many tools available that can be used for acquiring this information, and each of these tools will provide valuable information pulled from domain registration. These tools include the following: (Oriyano 2011) Whois: A query and response protocol that is widely us. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 2 years ago

Preview 1 out of 3 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$5.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

60
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 06, 2022

Number of pages

3

Written in

Seller


seller-icon
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Aug 06, 2022

Downloads

 0

Views

 60

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$5.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·