Choose three (3) tools that will yield information potentially useful for a pene
ID: 3745197 • Letter: C
Question
Choose three (3) tools that will yield information potentially useful for a penetration test. This information must be fundamentally different than previous tools, e.g.; not just another WHOIS tool. Use the lists at: http://osintframework.com/ and/or http://www.subliminalhacking.net/2012/12/27/osint-tools-recommendations-list/ for some tool ideas.
Tool 1:
Name: __________________________
Type of information found: ________________________________________________
How could this be useful in a penetration test? __________________________________
Tool 2:
Name: __________________________
Type of information found: ________________________________________________
How could this be useful in a penetration test? __________________________________
Tool 3:
Name: __________________________
Type of information found: ________________________________________________
How could this be useful in a penetration test? __________________________________
Firm 2:
Name: ______________
Corp. HQ addr: _____________.
Source: __________________
Website: _________________
IP range: __________________.
Source (which WHOIS site?): ____________________
Other domains owned: (Hint: Use a google search to find tools to do this reverse lookup): ______________________, ________________, ________________
Source (which tools did you use?) _____________________
Subdomains on the main website: ______________________, ____________________, __________________, ________________________
Source (which tools did you use?) _____________________
Mail servers: ___________________, ______________________
Does this company host its own mail? _______________.
How do you know? ______________
Explanation / Answer
Tool 1
Name: - Wireshark
Types of information found: This is a network protocol analyzer and effective at providing minute details network protocols, decryption and even packet information.
How this tool could be useful: the information that is retrieved by this tool can be viewed in a GUI mode or through the TShark utility. This tool is good at finding out the vulnerabilities such as SQL injection, buffer overflow, etc. This tool can easily detect and exploit several vulnerabilities.
Tool 2
Name: - Metasploit
Types of information found: this tool is used by PERL. This is one of the widely used penetration testing tools. It provides several ways to figure out vulnerabilities and allow security tester to make changes.
How this tool could be useful: It helps in building Web-based support and also Java GUI. This tool supports lots of exploits and payload such as reverse shell. Moreover, this tool has a built-in sniffer such that it can check the DNS server and also the access points and thereby facilitating attacks.
Tool 3
Name: - W3AF
Types of information found: this is by far the latest tool for application testing from the developers to find out the vulnerabilities. This tool is easier to handle and even effective at finding Web application vulnerabilities.
How this tool could be useful: the tool has got lots of features such as proxy, adding custom headers to request, local DNS cache, cookie handling. Moreover, framework parameter can be saved in a file using its feature and replicate an attack scenario.
Firm 2:
Name: Google
Corp. HQ addr: Mount View, California, United States
Source: www.google.com
Website: www.google.com
IP range: 64.233.160.0 to 64.233.191.255
Source: www.lifewire.com
Other domains own: www.google.co.in, www.google.co.uk, www.google.cn, www.google.co.au
Source (which tool did you use): Metasploit
Mail Servers: yes, Google has their own public mail servers.
Does this company host its own mail: Yes the company hosts its own mail.
How do you know: Every organization uses their own mail servers for internal communication. This will ensure secure communication between employees. Since the mail servers are using domain name these mail servers can be hosted along with the DNS server within the company’s network.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.