Reference no: EM133276945
1. How do you think performing the advanced searches with OSNIT, Google SE, and CLI search with theHarvester facilitates pen testing by IT/cybersecurity professionals?
2. Indicate what other valuable information other than IP addresses, DNS and domain info, SSL certificates, email addresses, and hosts can be grabbed from this search.
3. What is the difference between active reconnaissance and passive reconnaissance?
4. Research two other search engines and provide the details to conduct the same type of information gathering. Provide the search results, what you searched for, and a screenshot.
5. While conducting information gathering of a target company's website, no search engine provided any details. After manually reviewing the website, you noticed an email address with a different domain than that of the website. How can this be used?
6. What ports are open (listening) and what services did tools, Nmap, theHarvester, and the Legion identify? Is there anything else of value? What type of information would you look for when performing information gathering?
7. While conducting information gathering of a target company's website, no search engine provided any details. After manually reviewing the website, you noticed an email address with a different domain than that of the website.
8. Based on your pen testing experience gained in this lab, what can you do to ensure that your client organization incorporates pen testing as part of its implementation procedures to ensure optimum internal or external security?
9. Assuming you are a member of a pen testing team, and you identify vulnerabilities and exploits in your client's network, should you obtain written permission prior to compromising the known vulnerability? Why or why not in terms of rules of engagement?
10. As a cybersecurity consultant, you were part of a team hired to conduct pen testing to evaluate the security of your client's IT infrastructure. Why is it critical to perform pen testing on the internal network of your client prior to production implementation?