Activity 3: Using Footprinting Tools
Objective: Learn how to use footprinting tools, such as the SamSpade Whois utility.
Description: Security testers need to know how to use tools for gathering information about networks. With the Whois utility, you can discover which network configuration factors might be used in attacking a network.
2. Type mit.edu in the Whois text box, click the Whois button, and then scroll down and view the information displayed (see Figure 4.5).
3. Note the name of the person listed in the Administrative Contact section. This information is important when you do Activity 4.2 later in the chapter. Also, note the IP addresses and name servers listed. Chapter 5 covers port scanning and explains how these IP addresses can be used to gather more information about name servers.
4. Try entering several other organizations in the Whois text box and repeat Steps 2 and 3. Note that some organizations are more discreet about what’s listed in their output screens. For example, when describing an administrative contact, giving just a job title is better than listing an actual name, as you’ll soon discover. 5. Leave your Web browser open for the next activity.