For this post, I will attempt to run a footprint on a website as per one of my assignments at school. As someone who has little knowledge of the offensive side of cybersecurity, the Visio footprinting assignment was undoubtedly an eye-opener. In my map of http://bellevue.edu/, I was […]
What is a reverse DNS lookup? How can it be used when footprinting or attacking a network? IP addresses are used for communication between devices on both internal and external networks. Because of the number of IP addresses out there, the length of IP addresses, and how many […]
As the saying goes, the only way to truly secure a computer is to remove the ethernet cable; I have heard this often in my early days learning I.T.; however, even that is not true anymore, is it? Cybersecurity is an odd field as there is really nothing […]
You must be logged in to post a comment.