Lab 1 - Footprinting the network
Hands-on Activity
(DUE January 20, 2006 before midnight (11:59 p.m. EST) One of the most astounding side-effects of the Internet is how readily accessible information is about individuals, organizations, and computer systems. This assignment is designed to give you some experience in obtaining this information.
- Starting the information gathering
- Use NSLookup to determine the IP address of cpsc.ColumbusState.edu and sail-1.ColumbusState.edu
- Determine who administers these computers and any other information readily available about the network. You may use any websites or tools like ARIN, Neotrace, Whois, or other open source public information. Describe how you found the information. You now have all kinds of information that would allow you to take advantage of vulnerabilities at that site.
- Repeat this process for your place of employment or the school where you obtained your undergraduate degree or your favorite website.
- Web servers are notorious for containing large numbers of vulnerabilities. These are often evidenced by open ports. Security experts need to be able to determine which ports on the managed servers are open and close those that are not needed. One of the first intrusions by a hacker will be to map which computers on your network are open and what ports are available to be compromised. Download NetBrute. CSU does monitor it's networks very tightly, so you must be careful using this tool. Students have been locked out of the university network and servers when they used this carelessly.
- Inspect cpsc.ColumbusState.edu and sail-1.ColumbusState.edu using the PortScan feature of NetBrute. Describe what you found and how you found it.
- Many of the vulnerabilites are found on web servers. Find out which of the hosts in the same subdomain as cpsc.ColumbusState.edu (168.26.193.209/28) have web servers running. Select a few of these and try and determine what the server is used for. Describe what you found and how you found it.
Questions
- Discuss the information that you found about cpsc.ColumbusState.edu, sail-1.ColumbusState.edu, and one other system.
- Discuss ways that a hacker would be able to exploit this information.
TURN YOUR ASSIGNMENT IN USING THE DROPBOX IN WEBCT