Lab work

  This hands-on lab demonstrates how to spend "Footprinting of a network" The best way to fix your infrastructure is arrest is to imply the steps an intruder may use to mark a reconnaissance a network.  Choose one of the underneath paths Easy or Hard provide screenshots and a digest of your findings,  "If you do both, you obtain assent-to extra security." This use is exploratory (no fit or injustice confutation) GUI - Easy 1. Go to input "" Go through the citation records (A, AAAA, CNAME, MX, NS, PTR, SRV, SOA, TXT, CAA) In a account instrument portraiture and paste the advice (Blue Text) of all the Citation Record advice 2. Use Sam Spade to get past advice environing the network, what ever you find put it in the account instrument as well-behaved. Sam Spade Video (If you do not affect this video Google Sam Spade Footprinting) Manually-Hard 3.  Use Command Prompt: Run Traceroute on to get past details see instrument here 4. Use Command Prompt to Use nslookup see instrument here  Consider: Is the office arrest after a while SSL? is the office assailable to script injection attacks? Look at the cause legislation does everything pause out to you? What did you find out environing the network? Are other networks conjoined to it? Is it a Linux or Windows server Based on your findings what are some vulnerabilities