Students are asked to perform a pen testing test on a web site using open source tools.
During the assignment you are asked to detail the following:
When conducting analysis using Open Source Intelligence (OSINT), please try to establish the following:
You have just joined a cyber-security company and you are about to assist one of the engineers with the preparation of security audit for two of the company customers. You have been asked to establish what digital footprint, important to security audit, can be obtained using an open source intelligence techniques.
One of the customers mentioned in question 1, has reported that it has discovered suspicious activity on their firewall. They have asked you to obtain as much information as possible about the attackers source IP address. You have been asked to use Open Source Intelligence techniques only. Any active engagement like scanning, or social engineering is outside of the scope at the
Your target IPs are:
Find the following if possible, Email addresses, ip addresses, software server version,
Open Source Pentesting Resources
Use the following tools in Windows:
Nslookup , (switches) mx, ptr, ns, A, txt
Use the Following tools in Kali Linux