A very useful resource for passively gathering information about a target company is:
A very useful resource for passively gathering information about a target company is:
What is the obstructed IP address in the e-mail URL?
You receive an email with the following message:
Hello Steve,
We are having technical difficulty in restoring user database record after the recent blackout. Your
account data is corrupted. Please logon to the SuperEmailServices.com and change your
password.
http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm
If you do not reset your password within 7 days, your account will be permanently disabled locking
you out from our e-mail services.
Sincerely,
Technical Support
SuperEmailServices
From this e-mail you suspect that this message was sent by some hacker since you have been
using their e-mail services for the last 2 years and they have never sent out an e-mail such as this.
You also observe the URL in the message and confirm your suspicion about
0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following
at Windows 2000 command prompt:
Ping 0xde.0xad.0xbe.0xef
You get a response with a valid IP address.
What is the obstructed IP address in the e-mail URL?
Which of the following tools are used for footprinting?
Which of the following tools are used for footprinting? (Choose four)
what is the next step to be performed after footprinting?
According to the CEH methodology, what is the next step to be performed after footprinting?
What does the following command accomplish?
NSLookup is a good tool to use to gain additional information about a target network. What does
the following command accomplish?
nslookup
> server <ipaddress>
> set type =any
> ls -d <target.com>
what port/service should you look for to attempt a zone transfer?
While footprinting a network, what port/service should you look for to attempt a zone transfer?
Which one would you suggest she looks in first?
Your lab partner is trying to find out more information about a competitors web site. The site has a
.com extension. She has decided to use some online whois tools and look in one of the regional
Internet registrys. Which one would you suggest she looks in first?
Which of these would be a cause for alarm?
Network Administrator Patricia is doing an audit of the network. Below are some of her findings
concerning DNS. Which of these would be a cause for alarm?
Select the best answer.
Which of the following could be the most likely cause behind this lack of response?
Doug is conducting a port scan of a target network. He knows that his client target network has a
web server and that there is a mail server also which is up and running. Doug has been sweeping
the network but has not been able to elicit any response from the remote target. Which of the
following could be the most likely cause behind this lack of response? Select 4.