INTRODUCTION
Active reconnaissance requires you to make some kind of contact with your target. This contact can be a phone call or a visit to the target company under some pretence to gather more information, usually as part of social engineering. Alternatively, it can be a direct connection to the target system, whether visiting their website or checking if their firewall has an SSH port open. Think of it like you are closely inspecting windows and door locks. Hence, it is essential to remember not to engage in active reconnaissance work before getting signed legal authorization from the client.
TASK 2: web Browser
Answers: 8
TASK 3: Ping
Answers:
-s
8
Y
10
Task 4: Traceroute
The traceroute command traces the route taken by the packets from your system to another host.
Answers:
172.67.69.208
104.26.11.229
26
No answer needed
Task 5. Telnet:
The command telnet uses the TELNET protocol for remote administration.
Answers:
Apache
2.4.10