Please read and follow the lab and answer all these questions (Highlighted in yellow).
Section 1- Using Google Search Operators: Review the search results. Take a screenshot of one of the login forms
Section 2- Using archive.org: Take a screenshot of the browser window where Paul’s phone is shown.
Section 3- Using gau Tool to Obtain a List of Archived URLs: Take a screenshot of the terminal window showing the last 10 to 20 rows of the result
Section 4- Using Shodan: Included accurate screenshot.
Section 5- Using sublist3r and amass: Take a screenshot of the terminal window (no need to capture all of the results)
Section 6- Finding DNS Records of a Domain by using nslookup: Take a screenshot of the terminal window.
In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you’re confused about. Questions asked here will be summarized and answered anonymously in the next class.