Professional Documents
Culture Documents
067636
Key Concepts
● Information gathering––reasons, tools, and techniques
● Footprinting as a data-gathering technique
● Information gathering and footprinting––countermeasures
Reading
● Information Gathering, Footprinting Tools and Techniques - books, articles and journals.
Keywords
Use the following keywords to search for additional materials to support your work:
● Information Gathering
● Footprinting
● Data Gathering Techniques
● Network Mapper (nmap)
● Vulnerability Scanning
Assignment Requirements
Using the network diagram of Altoro Mutual company’s systems and security infrastructure
Information Gathering Plan,” create a page or two-page plan to gather information of the
company’s systems.
Page 1 of 4
CSA 33203: Penetration Testing
Consider the following questions:
● How would you determine the company’s Internet Protocol (IP) address range?
=65.61.137.64 - 65.61.137.127
● What information can you retrieve from the Domain Name System (DNS)?
● How would you fingerprint the network?
● What information would you want to gather from systems, and how would you gather it?
● What role would social engineering play in your information gathering process?
● What information would be publicly published, and what would be worth gathering?
● What challenges you might encounter in your scans?
Required Resources
● Altoro Mutual Company weblink: http://demo.testfire.net
Assignment Requirements
For this assignment, your reporting manager has asked you to write a plan for the organization
that will protect it from data gathering and footprinting. Using the network diagram given in
Page 2 of 4
CSA 33203: Penetration Testing
Assignment 1: Information Gathering Plan as a guide to what an attacker might do, prepare one
page or two-page plan to defend the campus network against attempts to gather data about
systems and networks. Explain how the data gathering techniques can be prevented by your
protection plan. In addition, explain when and how the use of data gathering tools is appropriate
or useful for the organization’s security.
= As has many organizations learned how to respond to security incidents only after suffering
attacks. By this time, incidents often become much more costly than needed. Proper incident
response should be an integral part of any overall security policy and risk mitigation strategy.
There are clearly direct benefits in responding to security incidents. The value of forming a
security incident response team with explicit team member roles is a must do, as well as how to
define a security incident response plan. To successfully respond to incidents, you need to :
Minimize the number and severity of security incidents . Assemble the core Computer Security
Incident Response Team ( CSIRT ).
Sample Information Gathering Plan for Assignment 1 and Assignment 2 (if relevant)
Phases and Activities
1. Gather information
a. Review website
= http://demo.testfire.net
b. Review company information
= company located (Greenwich CT)
c. Identify technology and software used by the organization
= banking J2EE web application
d. Search for employee forum, blog, or other postings
=
e. Use Google searches to identify exposed information
= Chief Executive Officer of Altoro Mutual (Karl Fitzgerad)
Page 3 of 4
CSA 33203: Penetration Testing
= 65.61.128.0
c. Identifying active machines
=Metasploitable machine
d. Ping or port scan 65
=80 tcp auto Apache Tomcat/Coyote JSP Engine 8080 tcp http Apache
Tomcat/CoyoteJSP Engine.
e. Detecting operating systems
=
Page 4 of 4