LOT2-Task3.pptx - Hacking Countermeasures and...

This preview shows page 1 - 6 out of 15 pages.

Hacking Countermeasuresand Techniques-Task3By- Ashish Kunwar
Summarize your findings of a footprinting analysis youperformed on your chosen organization.My chosen organization is LowesHere are my finding:1)Open Source Searching performed and found out basicinformation likenature of business, products-services,competitors, financial status of target organization.2)Identified top management of Lowes3)Identified domain details using whois tool – domain name,domain registrant,administrative contact,technicalcontact, DNS servers,network range and web serviceprovider.4)Identified the URL of employee login Portal5)Found Lowes Third Party IT Security Policy and code ofbusiness Conduct & Ethics
Summarize your findings of a footprinting analysis youperformed on your chosen organization.6)Found the owner of lowes.com IP address7) Used nslookup command to view DNS server IPaddress.8) Attempted to perform DNS zone transfer to localsystem – DNS server refused transfer zone9) Identified the path to destination IP address usingtracert command. No of hops identified.10) Identified name and IP address of mail serverusing Sense Post - BiDiBLAH tool11) Discovered various technologies used by Lowesfrom job posting advertised
Footprinting analysis could be used toinitiate an attack against the organizationRefer to foot notessection how footprinitng can initiate an attaks.Open Source SearchingIdentified top management of LowesIdentified domain details using whoisARIN toolIdentified the URL of employee login PortalFound the owner of lowes.com IP addressUsed nslookup command to view DNS server IP addressAttempted to perform DNS zone transfer to local systemIdentified the path to destination IP address using tracert command.No of hops identifiedIdentified name and IP address of mail server using Sense Post -BiDiBLAH toolDiscovered various technologies used by Lowes from job postingadvertised
3) Social engineering techniques that could be utilized to gatherinformation regarding the organization’s computer systems

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 15 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture