Answered step by step
Verified Expert Solution
Question
1 Approved Answer
During your reading this week, you learned about the significance of footprinting to hackers. Hackers take everyday information and network tools and distort their purpose
During your reading this week, you learned about the significance of footprinting to hackers. Hackers take everyday information and network tools and distort their purpose to aid in their hacking activities. They compile the information they learn during the footprinting phase to increase the effectiveness of their attacks. Understanding how attackers use these tools is an important first step in mitigating attacks.
Instructions
In this assignment, write a page paper in which you:
Describe the most common tools used by both malicious and ethical hackers to conduct footprinting.
Identify the tools.
Explain why hackers choose these tools to use.
Describe why ethical hackers explore network information before carrying out an investigation.
Analyze the primary differences between Nslookup and WHOis in assessing domain information.
Explain how an ethical hacker uses the information derived by use of Nslookup and WHOis to mitigate network connectivity issues.
Your assignment must be supported by a minimum of three recent, peerreviewed references. Citations and references must be formatted using current APA style.
Structure your report as follows:
Title page.
Introduction.
The main body at least three pages; use headings to identify individual sections.
Summary and conclusion.
References page.
Capella academic integrity standards must be strictly followed.
Submission Requirements
Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional.
References: Include a minimum of three recent, peerreviewed references. Remember the Undergraduate Information Technology Research Guide
Links to an external site. is there to help you.
APA style: Citations and references must be formatted using current APA style. Visit Evidence and APA Citation
Links to an external site. for help.
Length of the report: A minimum of four typed, doublespaced pages, excluding the title page and references page.
Font: Times New Roman, points.
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Competency : Perform vulnerability analysis and penetration testing using ethical hacking techniques.
Describe the most common tools used by both malicious and ethical hackers to conduct footprinting.
Analyze the primary differences between Nslookup and WHOis in assessing domain information.
Competency : Analyze packets using sniffing tools.
Describe why ethical hackers explore network information before carrying out an investigation.
Competency : Identify the vulnerabilities of common protocols used in an organization.
Explain how an ethical hacker uses the information derived by use of Nslookup and WHOis to mitigate network connectivity issues.
Competency : Communicate in a manner that is professional and consistent with expectations for members of information technology professions.
Support the report with recent, peerreviewed references.
Communicate in a manner that is professional and consistent with expectations for professionals in the field of information technology.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started