Locate a any website organization. Next, perform some security reconnaissance to find out as much information as you can about the website. Things to consider might include:

HTML/scripting languages used, and
Are there any submission forms where perhaps an SQL injection attack could be attempted?
What web server software is the site using?
Utilize Whois style searches to garner footprint and potential information for an attack.
use the information that you obtain to discuss how an attack or potential intruder could use this information for a potential website attack. cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks.

Sample Solution

This question has been answered.

Get Answer