Sie sind auf Seite 1von 6

CEH iLabs Report

Footprinting and Reconnaissance


Lab Objective
The objective of the lab is to extract information about the target organization that includes, but is not
limited to:

 Internet Protocol (IP) address and IP range associated with the target
 Purpose of organization and why it exists
 Size of the organization
 Class of its IP block
 People and contacts at the target
 Types of operating systems (OS) and network topology in use
 Type of firewall implemented, either hardware or software or combination
 Type of remote access used, either SSH or VPN

To attempt this lab, you must log into your iLabs account and then find the virtual lab associated with
this assignment. Be aware of the time limit associated with this lab, as your VMs will expire after that
point. You can return to the lab after it expired, but any progress you made will be lost.

Lab Tasks
For each of the major sections of this lab, you will be asked to produce a screenshot showing your
progress. The screenshot should contain your entire window (which includes the sidebar). You can
accomplish this by pressing the “print screen” button on your keyboard. Below is an example acceptable
screenshot:
Exercise 1: Open Source Information Gathering Using Windows Command Line Utilities
Please follow along with this section and provide the following screenshots:

Ping the domain www.moviescope.com as a means to determine its IP

Ping the domain using the largest pint fragment that you enumerated
Use tracert to determine the hops that it takes

Exercise 2: Collecting Information About a Target Website Using Firebug


Please follow along with this section and provide the following screenshots and short answer:

Using firebug, capture the information found in the security tab


Using firebug, review the various HTTP requests by reviewing the Network tab

SHORT ANSWER: why is a tool like Firebug so important when conducting recon on a web application?
What are the kinds of things you can learn by reviewing the HTML and all of the supporting
information?
Firebug can in ways highlight vulnerability’s in the code itself and also just gives you an easy tool to
sort through the pages information

Exercise 3: Mirroring Website Using HTTrack Web Site Copier


Please follow along with this section and provide the following screenshot and short answer:

Take a screenshot of both HTTrack indicating a successful copy as well as showing the cloned website
in the browser
SHORT ANSWER: why would you want to clone a website and work with it offline? Why not just
conduct your recon and scanning on the live site?
So you can try things on the website without the host knowing in a sandbox kind of way and also it
won’t set off alarms

Exercise 4: Advanced Network Route Tracing Using Path Analyzer Pro


Please follow along with this section and provide the following screenshot and short answer:

Take a screenshot of the Path Analyzer Pro window showing the “synopsis” tab, which indicates a
successful scan.
SHORT ANSWER: What is the purpose of this tool? Review some of the additional tabs (such as the
stats and log), what are some interesting information that you can learn from this tool?
Im not sure because I couldn’t get it to work but according to the book it can all sorts of information
such as the dns records, routing, Registries and the best lawful intercept.

Exercise 5: Information Gathering Using Metasploit


Please skip this lab—we will be covering Metasploit in-depth later on in this course. You are more than
welcome to do this lab on your own, but it just has you mothing through steps, were you will fully
understand how the tool works and what it does.

When you are done with this assignment, don’t forget to save it as a PDF.

Das könnte Ihnen auch gefallen