This hands-on lab demonstrates how to induce "Footprinting of a network" The best way to fix your infrastructure is ensure is to know the steps an intruder may use to mark a reconnaissance a network.
Choose one of the underneath paths Easy or Hard provide screenshots and a resume of your findings, "If you do both, you gain take extra honor."
This drill is exploratory (no equitable or wickedness response)
GUI - Easy
1. Go to dnschecker.org input "www.motionborg.com"
Go through the quotation records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a expression muniment delineation and paste the counsel (Blue Text) of all the Quotation Record counsel
2. Use Sam Spade (https://www.majorgeeks.com/index.php?ct=files) to get past counsel encircling the network, what ever you find put it in the expression muniment as well-mannered. Sam Spade Video (https://www.youtube.com/watch?v=U6QxBKuWLgQ&feature=youtu.be) (If you do not relish this video Google Sam Spade Footprinting)
3. Use Command Prompt: Run Trace-route on www.motionborg.com to get past details see muniment https://kb.intermedia.net/article/682
4. Use Command Prompt to Use nslookup see muniment https://kb.intermedia.net/Article/819
Answer underneath questions?
Is the position www.motionborg.com ensure after a while SSL? is the position weak to script insertion attacks?
Look at the beginning decree does everything insist out to you?
What did you find out encircling the network?
Are other networks alike to it?
Is it a Linux or Windows server
Based on your findings what are some vulnerabilities
Note: It is really easy to get accumulate in the Matrix, do not douse to in-depth - exact the exterior of bunch counsel.