Complete the Data Gathering and Footprinting on a Targeted Web Site lab. As you go through the lab, be sure to: (COMPLETED)
Perform all screen captures as the lab instructs and paste them into a Word document. (COMPLETED)In the same Word document, explain the concepts and procedures associated with data gathering and footprinting by addressing the following:
Explain why the WHOis tool is useful.
Identify the functions included in Sam Spade that you think you will be most likely to use.
Explain when you might use tracert as an investigative tool.
What output is generated by the tracert command?
Analyze the usefulness of Sam Spade to security practitioners and hackers.
Discuss the privacy considerations of WHOis information.
Explain the purpose of footprinting.
Identify the primary technical contacts for the three domains discussed in the lab.
Now apply what you learned in the lab to the following scenario.Scenario and Your Role
You have been asked by a colleague to contribute to a professional blog site for which she is the administrator. Your topic is the significance of data gathering and footprinting to hackers.Requirements
Continue working in the same document; simply start your article on a new page with an appropriate heading.
Write an article in which you:Explain the most common tools used by both malicious and ethical hackers to conduct footprinting.
Identify the tools.
Explain why hackers choose these tools to use.
Explain why ethical hackers explore network information before carrying out an investigation.
Analyze the primary differences between Nslookup and WHOis in assessing domain information.
Explain how an ethical hacker uses the information derived by use of Nslookup and WHOis to mitigate network connectivity issues.Support your work with references from at least three recent, relevant professional resources.