From 75794eaa95cc5fea85a096e6a240c4305df803f6 Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Fri, 18 Oct 2019 11:27:59 +0100 Subject: [PATCH] lab update --- .../4_dns_footprinting.xml | 53 +++++++++++++++++++ 1 file changed, 53 insertions(+) create mode 100644 scenarios/labs/introducing_attacks/4_dns_footprinting.xml diff --git a/scenarios/labs/introducing_attacks/4_dns_footprinting.xml b/scenarios/labs/introducing_attacks/4_dns_footprinting.xml new file mode 100644 index 000000000..895e89b2b --- /dev/null +++ b/scenarios/labs/introducing_attacks/4_dns_footprinting.xml @@ -0,0 +1,53 @@ + + + + + Information gathering: footprinting + Z. Cliffe Schreuders + +# Introduction +The topic of information gathering spans two weeks, and covers practical steps that an attacker needs to take in order to attack a system, starting with footprinting (discovering systems to attack) and scanning (learning more about the systems such as what kinds of attacks they are vulnerable to). + +# Lecture +[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_4_Information_gathering.html) + +# Reading +[Part I Casing the establishment. McClure, S. and Scambray, J. and Kurtz, G. (2009), Hacking exposed, McGraw-Hill. (ISBN: 978-0-07-161375-0) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071613750) + +# Lab +[Lab sheet here](https://docs.google.com/document/d/1Whs4c_mN7fFjtrYgg_uzmCGBH_EYjr7fTAgoM-OZTqQ/edit?usp=sharing). + + + lab-sheet + easy + + + kali + + + + + + {"username":"root","password":"toor","super_user":"","strings_to_leak":[],"leaked_filenames":[]} + + + + + + + + + + + + + +