Unformatted text preview: to me. 3. I used dnsstuff.com a. I used the WHOIS search to find the domain administrator for www.ford.com . b. I got the domain registrant, domain name, administrative contact, technical contact, and the date the domain was created on. Here is the link: http://www.dnsstuff.com/tools/whois.ch?ip=www.ford.com c. This information could be very valuable to an attacker as it has email addresses in it. 4. I looked at the HTML for Ford’s website. It was made using some type of Flash editor, using mostly javacript and VBSscript. a. I used the View -> Source option in my Safari browser. b. I was able to gain a lot of information about the structure of their site. c. An attacker could use this to attack a companies website if they knew how to access it....
View Full Document
This lab report was uploaded on 04/21/2008 for the course IT 101 taught by Professor Watt during the Spring '07 term at RIT.
- Spring '07