Lab photoprinting
Attached Files:
Footprinting of a Network.docx (61.144 KB)
This hands-on adviser demonstrates how to conduct "Footprinting of a network" The best way to ensure your basement is defended is to accept the accomplish an burglar may use to brand a recon a network.
This exercise is basic (no appropriate or amiss answer)
Find any website and analysis the DNS records
1. Go to dnschecker.org
Go through the argument records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a chat certificate archetype and paste the advice (Blue Text) of all the Argument Record information
2. Download Sam Spade
Search the area using Sam Spade to get added advice about the network, what anytime you acquisition adhesive it in the chat certificate as well.
Sam Spade Video (If you adopt addition video Google Sam Spade Footprinting)
Is the website defended with SSL?
What did you acquisition out about the network?
Are alternative networks affiliated to it?
Is it a Linux or Windows server
Based on your allegation what are some vulnerabilities
Note: It is absolutely accessible to get ashore in the Matrix, do not dive to all-embracing - aloof the apparent of acquisition information.
Order a unique copy of this paper