Answered You can hire a professional tutor to get the answer.
This hands-on guide demonstrates how to conduct "Footprinting of a network" The best way to ensure your infrastructure is secure is to understand the steps an intruder may use to footprint a reconnais
This hands-on guide demonstrates how to conduct "Footprinting of a network" The best way to ensure your infrastructure is secure is to understand the steps an intruder may use to footprint a reconnaissance a network.
Choose one of the below paths Easy or Hard provide screenshots and a summary of your findings, "If you do both, you will receive extra credit."
This exercise is exploratory (no right or wrong answer)
GUI - Easy
1. Go to dnschecker.org input "www.motionborg.com"
- Go through the text records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a word document copy and paste the information (Blue Text) of all the Text Record information
2. Use Sam Spade (https://www.majorgeeks.com/index.php?ct=files&action=download&)to get more information about the network, what ever you find put it in the word document as well. Sam Spade Video (https://www.youtube.com/watch?v=U6QxBKuWLgQ&feature=youtu.be)(If you do not like this video Google Sam Spade Footprinting)
Manually-Hard
3. Use Command Prompt: Run Traceroute on www.motionborg.com to get more details see document here(https://kb.intermedia.net/article/682)
4. Use Command Prompt to Use nslookup see document here (https://kb.intermedia.net/Article/819)
Consider:
- Is the site www.motionborg.com secure with SSL? is the site vulnerable to script injection attacks?
- Look at the source code does anything stand out to you?
- What did you find out about the network?
- Are other networks connected to it?
- Is it a Linux or Windows server
- Based on your findings what are some vulnerabilities
Note: It is really easy to get stuck in the Matrix, do not dive to in-depth - just the surface of gathering information.