· 2-2 Virtual Lab: Lesson 1 (Footprinting Tools and Techniques) Footprinting gathers any information about domain names, services, scanning for open ports, remote capabilities, and any evident...

1 answer below »

· 2-2 Virtual Lab: Lesson 1 (Footprinting Tools and Techniques)


Footprinting gathers any information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls. This process usually takes place in the form of open-source footprinting, and the information is often garnered from a public website that is accessed legally.
For this activity, complete the following lab:Data Gathering and Footprinting Protection Plan.
Submit your completed lab in Blackboard.
To complete this assignment, review theLab Guidelines and Rubric document.



  • 2-3 Virtual Lab: Lesson 2 (Port Scanning and Ethical Hacking)



Port scanning uses network tools to identify any open security risks by utilizing ethical hacking to understand the risks. Various equipment is used to hack the system in a nonintrusive manner in order to identify these risks.
For this activity, complete the following lab:
Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation.
Submit your completed lab in Blackboard.
To complete this assignment, review the
Lab Guidelines and Rubric
document.




Document Preview:

ISE 620 Lab Guidelines and Rubric Overview: Each lab will be a valuable real-world experience utilizing network security tools to evaluate the security posture of an organization. You will use network security tools to identify security risks and vulnerabilities within an organization’s network. Your analysis will be instrumental in helping you identify remediation strategies to mitigate the security vulnerabilities identified. These labs and the problems in them are not directly related to your final project. Your focus will be on accurately completing and submitting all aspects of the lab so that your instructor can coach you on the skills you need to develop in this course. The feedback you receive from your instructor on these labs is important for you to hone these skills prior to beginning work on the various milestones for your final project. Prompt: Your lab assignments are set up for you to analyze network security tools and document the results within a virtual environment. Your evaluation of the network tools will require you to launch specific software applications, enter commands, and take screenshots of your results to submit as part of your lab. You will be required to configure network hardware and software components in order to mitigate security risks and vulnerabilities. You will export the documents from the lab environment, combine them into a single document, and submit the document via Blackboard for grading. Each lab has specific instructions within the lab itself. Each of your lab submissions will be scored according to the following critical elements: A. Accuracy in Use of Tool The elements of the exported lab should have minimal or no functional issues in accuracy. B. Completion of Lab Elements All aspects of your lab should be completed. C. Conclusions Your documentation, including all post-lab questions for the data collected, has minimal or no functional issues in accuracy. Guidelines for...



Answered Same DayDec 27, 2021

Answer To: · 2-2 Virtual Lab: Lesson 1 (Footprinting Tools and Techniques) Footprinting gathers any information...

David answered on Dec 27 2021
133 Votes
EXECUTIVE SUMMARY:
Footprinting and data gathering is an important process in gathering information for an
attacker. He can use these to find out informa
tion about the target organization and then execute
attacks by finding out the vulnerabilities .Here port scanning techniques and DNS scanning
techniques are used to find information about the target organization.
Though these techniques are not limited to and are plenty, with increase in innovation also
helping out hackers it is understandable why attackers are prone to using these kinds of techniques.
Footprinting begins by determining the location and objective of an intrusion. Once this is known,
specific information about the organization is gathered using non-intrusive methods.
METHODOLOGIES:
The methodologies used here include using the command line prompt and other free or
open source tools to gather important information about the target organization to be attacked.
The following commands have been used here to identify the information about organization
a)nslookup
b)whois
c)traceroute
d)ping
e)decode
These kind of tools are very common in the market and all one has to do is to type the command and
IP address of target organization next to command to obtain the information. It is that simple. For
instance, the organization's own Web page may give a employee catalogue or representative
profiles, which may demonstrate helpful if the hacker needs to utilize social engineering to achieve
the goal. Directing a whois inquiry on the Web gives the space...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here