Summarizes your findings from iana whois sam spade utility


You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company.

In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.
To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.
read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)

For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: Summarizes your findings from iana whois sam spade utility
Reference No:- TGS01690260

Expected delivery within 24 Hours