This hands-on lab demonstrates how to conduct “Footprinting of a network” The best way to ensure your infrastructure is secure is to understand the steps an intruder may use to footprint a reconnaissance a network.
Choose one of the below paths Easy or Hard provide screenshots and a summary of your findings, “If you do both, you will receive extra credit.”
This exercise is exploratory (no right or wrong answer)
GUI – Easy
- Go through the text records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a word document copy and paste the information (Blue Text) of all the Text Record information
2. Use Sam Spade (https://www.majorgeeks.com/index.php?ct=files) to get more information about the network, what ever you find put it in the word document as well. Sam Spade Video (https://www.youtube.com/watch?v=U6QxBKuWLgQ&feature=youtu.be) (If you do not like this video Google Sam Spade Footprinting)
3. Use Command Prompt: Run Trace-route on www.motionborg.com to get more details see document https://kb.intermedia.net/article/682
4. Use Command Prompt to Use nslookup see document https://kb.intermedia.net/Article/819
Answer below questions?
- Is the site www.motionborg.com secure with SSL? is the site vulnerable to script injection attacks?
- Look at the source code does anything stand out to you?
- What did you find out about the network?
- Are other networks connected to it?
- Is it a Linux or Windows server
- Based on your findings what are some vulnerabilities
- Note: It is really easy to get stuck in the Matrix, do not dive to in-depth – just the surface of gathering information.