Discuss what information a hacker orchestrates in footprinting?
Define the following pieces gathered by a target during footprinting
Domain name
Network blocks
Network services and applications
System architecture
Intrusion detection system
Authentication mechanisms
Specific IP addresses
Access control mechanisms
Phone numbers
Contact addresses
Discuss the common tools used for footprinting and information gathering are as
follows:
Domain name lookup
Whois
NSlookup
Sam Spade
TO GET THIS OR ANY OTHER ASSIGNMENT DONE FOR YOU FROM SCRATCH, PLACE A NEW ORDER HERE
