Footprinting February 16, 2010 MIS 4600 – MBA 5880 - © Abdou Illia.

Slides:



Advertisements
Similar presentations
1 Technical Area highlights and priorities APNIC Member Meeting 29 February 2008 APNIC 25, Taipei George Michaelson.
Advertisements

NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
An Introduction to the databases and to searching techniques.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2005.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
1 Review For Exam 3 (Part 2) BUS Abdou Illia, Fall 2009.
The CMS Intranet. Homepage The first thing you must do is enter the college web address in the address bar. After the home page has loaded, you must click.
LAN Management © Abdou Illia, Spring 2007 School of Business Eastern Illinois University 3/6/2007 Lab.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
1 Review For Exam 3 (Part 2) BUS Abdou Illia, Fall 2010.
Reverse DNS Delegations, Templates and RWS Andy Newton Chief Engineer.
Installing a DHCP Server role on Windows Server 2008 R2 in a home network. This is intended as a guide to install the DHCP role on a Domain Controller.
Classful IP Addressing
Chapter1 An Introduction to Marketing Research. The Importance of Information Companies Need Accurate Information About:..The marketing environment..Customer.
Slow Web Site Problem Analysis Last Update Copyright 2013 Kenneth M. Chipps Ph.D. 1.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2007.
Internet Information ISYS 105B. What is the Internet? Comprised of network of computers Started in 1969 by U.S. Defense Dept.
Basics of Web Design 1 Copyright © 2016 Pearson Education, Inc., Hoboken NJ.
Evaluating Online Information Sources Ask yourself the following questions…
Association of Corporate Counsel WEB RESOURCES.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
End-to-End Methodology. Testing Phases  Reconnaissance  Mapping  Discovery  Exploitation  Repeat…  Report.
Module 4: Fundamentals of Communication Technologies.
Computer Vocabulary Acceptable Use Policy conduct expected from someone using a computer.
The Internet TCIP/IP  TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Status report on Lame Delegations (work in progress) George Michaelson DB SIG APNIC17/APRICOT 2004 Feb KL, Malaysia.
The Internet School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 15, Monday 12/02/2002 and Wednesday 12/04/2002)
Using the Internet at City Hall FAST Internet Connections! Employee computers connected to T3 line Employee computers connected to T3 line Most Web pages.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
TCOM Information Assurance Management Casing the Establishment.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Ecommerce: The Internet and Electronic Commerce © Akhilesh Bajaj,
 (electronic mail) is the transmission of e  addresses are unique and consist of two parts separated by (‘at’) symbol in the form.
Footprinting and Scanning
Source Page US:official&tbm=isch&tbnid=Mli6kxZ3HfiCRM:&imgrefurl=
Independent Schools Survey— Fall 2005 Summary Report Conducted by the Data Committee of the Independent School Section of the AASL.
What’s wrong with this network? IP: SM: Default Gateway: /28 Fa0/1.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
Michael J. Bennett Digital Projects Librarian & IR Coordinator University of Connecticut Eastern CONTENTdm Users Group Conference Yale University New Haven,
Путешествуй со мной и узнаешь, где я сегодня побывал.
WHAT IS FOOTPRINTING?. FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target.
IP Address Quiz (Animated Presentation)
Chapter 15: The Internet and Your Job Search
Footprinting and Scanning
Nessus Vulnerability Scan
Footprinting (definition 1)
TCP/IP Concepts (Part 2)
Security Fundamentals
Footprinting and Scanning
February 12 – 19, 2018.
Page 1. Page 2 Page 3 Page 4 Page 5 Page 6 Page 7.
مراجعة عامة.
FootPrinting CS391.
Printed by the Riverside County Office of Education
Configuring Internet-related services
Human Impact on the Environment Unit
Introduction to Systems Security
What you will need to Register
/ / / / / /27.
Networks and the Internet
Footprinting. Сбор данных
1.3 Conduct appropriate market research for your project
Presentation transcript:

Footprinting February 16, 2010 MIS 4600 – MBA © Abdou Illia

Objectives  Discuss footprinting and how it is accomplished  Identify resources that can be used in footprinting  Footprint public web pages 2

What is Footprinting? 3  Footprinting = Process of collecting information about an organization, its network, its IP address ranges and the people who use them  Footprinting is conducted through social engineering and by researching information  from printed resources  From online resources  Footprinting tools/techniques  Gathering WHOIS information  Performing web reconnaissance  DNS interrogation

Summary Questions 4