logo

Ethical Hacking and Penetration Testing Discussion 2022

   

Added on  2022-08-12

5 Pages1232 Words11 Views
Running head: ETHICAL HACKING AND PENETRATION TESTING
ETHICAL HACKING AND PENETRATION TESTING
Name of the Student
Name of the University
Author Note

1ETHICAL HACKING AND PENETRATION TESTING
Discussions
In computers, footprinting is the procedure of accumulation of data regarding a
particular environment of network, usually for the reason of finding ways in order to intrude
into the environment (Hassan & Hijazi, 2018). The footprinting can reveal the vulnerabilities
of the system and upgrade the effortlessness with which they can be subjugated.
The tools those are utilised for footprinting are Sam Spade, nslookup, traceroute,
Nmap and neotrace.
Sam Spade: Sam Spade is a tool that is used in footprinting and it is a windows software tool
that is designed in order to track down sources of the spam of e-mail (Yang et al.,2019). It
was also the name of a free service of web that offers access to the same online tools. Steve
Atkins designed the Sam Spade utility in the year 1997. The features of this software include:
Transfer of zone
Decoding URL
Browse web
Parse headers of email
Scanning of addresses
Relay check of SMTP
Nslookup: nslookup is a command line tool for the administration of the network and it is
available in the operating systems of the computers in order to query the Domain Name
System in order to get the IP address mapping, the domain name, or the other records of DNS
(Mun et al.,2018). Nslookup is a useful command in order to get the information from the
server of DNS. It is a tool of network administration in order to query the Domain Name
System to get the domain name.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Policy .
|11
|3019
|463

Cyber Security - Assignment PDF
|8
|2242
|71

Ethical Hacking: Methodology, Tools and Penetration Testing
|17
|1703
|348

Nmap and Metasploit: A Comprehensive Analysis of Security Tools
|20
|2496
|156

Definitive Guide to Nmap (Network Mapper)
|11
|2038
|41

Overview of Network Security
|11
|1474
|434