Project Task1
Project Task1
Perform foot printing on micro soft website and gather information about
website by using online websites ( whois /net craft /shodan /dns dumpster ,) as
much as possible and a report on gathered information along with screenshot?
Basically foot printing is two types active and passive and here I was going to perform passive foot
printing i.e., collecting information of target without knowledge of target
TARGET : WWW.Microsoft.com
1. WHOIS
By using whois.domaintools.com [https://whois.domaintools.com]
REGISTER:
Registrar Mark Monitor, Inc. Mark Monitor Inc. IANA ID: 292
URL: http://www.markmonitor.com Whois Server: whois.markmonitor.com
Registrar Status
Client Delete Prohibited, client Transfer Prohibited, client Update Prohibited, server Delete Prohibited,
server Transfer Prohibited, server Update Prohibited
DATES:
NAME SERVERS
2.NETCRAFT.COM
Site rank - 86
Description - Explore Microsoft products and services for your home or business. Shop Surface,
Microsoft 365, Xbox, Windows, Azure, and more. Find downloads and get support.
Domain -microsoft.com
Organisation -Microsoft Corporation, One Microsoft Way,, Redmond, 98052, United States
Site Technologies
Doctype - HTML5
1.godaddy.com 2 . gitlab.com
3 .rakuten.co.jp 4 .hostinger.com
5 .namecheap.com 6 .fiverr.com
7 .brevo.com 8 .envato.com
4.Shodan.io
By using this we will get to know about target servers information and ports information i.e how many
servers are there and how any ports are there in that how any are opened etc this type of info we will got.
By opening the IP address shown there we will get more info regarding target i.e open ports, servers, etc
By knowing the servers information we will get the 30% inforamation about target
5.dns dumpster:
By using this we get more insight information regarding DNS servers, MX Records, TXT records, HOST
records
Architecture of microsoft
CONCLUSION:
By using whois and netcraft we will get target domain information and along with that by using shodan
and dns dumpster we will get the target server and ports and architecture insight details. They are
actually more of online resources are available to perform footprinting .By using this details attacker used
to perform phishing attacks on victims , footprinting is not illegal but miusing it is illegal. By using these
online resources we will get 100% information regarding the website then the attacker will make into
document and sends to victim ,the victim will trust and fall in attacker trap.
So, here by using passive footprinting attacker will get information without knowledge of target and the
attacker sometimes perform phishing attacks
Finally,Footprinting was performed successfully on microsoft website through online resources( whois/
netcraft / wapalayzer/shodan /dnsdumpster) and gathered information and it presented above along with
screenshots.