Question
Footprinting and Reconnaissance 1. When you used the ping command to find the IP Address of www.moviescope.com, what was happening in the background? In other
Footprinting and Reconnaissance |
1. When you used the ping command to find the IP Address of www.moviescope.com, what was happening in the background? In other words, what does it mean to ping?
Answer:
2. What do the switched -f and -l of the ping command specify? What happens if the frame is too large to be on the network? What response will you get? Answer:
3. Think like a hacker.why is the size of packets being exchanged between two hosts valuable info to a hacker. (This is not necessarily connected to the ping command.)
Answer:
4. As a part of information gathering, you have been asked to collect information on the target website and extract the source code of the web pages built in HTML, Java Script, CSS script, etc. This may reveal potential vulnerabilities in the web application that can be exploited later in the security assessment phases. Define and describe the Firefox Add-on you used in the second part of the lab.
Answer:
5. Hackers can learn a lot by viewing the source code of a website. How does one view the HTML of a website (aside from using Firebug)? What would you do to attempt to find login information?
Answer:
6. What is the meaning of CSS in reference to HTML?
Answer:
7. What is the meaning of DOM in reference to HTML?
Answer:
8. What does the Network Tab in Firebug contain? What can a hacker determine from this tab?
Answer:
9. What is Metasploit and what is it used for?
Answer:
10. Explain the switches used in the Nmap scan of the subnet 10.10.10.0/24 (-Pn, -sS, -A, -oX)
Answer:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started