02. Footprinting and Reconnaissance Flashcards

1
Q

What is FOOTPRINTING?

A

Footprinting is the first step of any attack on information systems in which an attacker collects information about a target network to identify various ways to intrude into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is PASSIVE FOOTPRINTING?

A

Gathering information about the target without direct interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ACTIVE FOOTPRINTING?

A

Gathering information about the target with direct interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give three examples of Organisation Information recovered from FOOTPRINTING.

A

employee details, telephone numbers, branch and location details, background of the organisation, web technologies, news articles, press releases, related documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give three examples of Network Information recovered from FOOTPRINTING.

A

domain and sub-domains, network blocks, network topology, trusted routers, firewalls, IP addresses of reachable systems, Whois records, DNS records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give three examples of System Information recovered from FOOTPRINTING.

A

web server OS, location of web servers, publicly available email addresses, usernames and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is [cache:]? (GOOGLE HACKING)

A

Displays the web pages stored in the google cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is [link:]? (GOOGLE HACKING)

A

Lists web pages that have links to the specified web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is [related:]? (GOOGLE HACKING)

A

Lists web pages that are similar to the specified web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is [info:]? (GOOGLE HACKING)

A

Presents some information that Google has abbout a particular web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is [site:]? (GOOGLE HACKING)

A

Restricts the results to those websites in the given domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is [allintitle:]? (GOOGLE HACKING)

A

Restricts the results to those websites containing all the search keywords in the title.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is [intitle:]? (GOOGLE HACKING)

A

Restricts the results to documents containing the search keyword in the title.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is [allinurl:]? (GOOGLE HACKING)

A

Restricts the results to those containing all the search keywords in the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is [inurl:]? (GOOGLE HACKING)

A

Restricts the results to documents containing the search keyword in the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is [location:]? (GOOGLE HACKING)

A

Finds information for a specific location.

17
Q

What is the GOOGLE HACKING DATABASE? (GHDB)

A

The Google Hacking Database (GHDB) is an authoritative source for querying the ever-widening reach of the Google search engine.

18
Q

What is the DEEP WEB?

A

It consists of web pages and contents that are hidden and unindexed and cannot be located using traditional web browsers and search engines. It can be accessed by search engines like Tor Browser and The WWW Virtual Library.

19
Q

What is WEBSITE FOOTPRINTING?

A

Website footprinting refers to the monitoring and analysis of the target organisation’s website for information.

20
Q

What may examining the HTML source code provide?

A

Comments present in the source code, Contact details of the web developer or admin, File system structure and script type

21
Q

What may examining COOKIES provide?

A

Software in use and its behaviour, Scripting platforms used

22
Q

What are WEB SPIDERS?

A

Web spiders, like Web Data Extractor and ParseHub, perform automated searches on the target website and collect specified information such as employee names and email addresses. Attackers use the collected information to perform footprinting and social engineering attacks.

23
Q

What is USER-DIRECTED SPIDERING? (three steps)

A

Attackers use standard web browsers to walk through the target website functionalities. The incoming and outgoing traffic of the target website is monitored and analyzed by tools that include features of both a web spider and an intercepting proxy. Attackers use tools like Burp Suite and WebScarab to perform user-directed spidering

24
Q

What is the purpose of MIRRORING an ENTIRE WEBSITE?

A

Mirroring an entire website onto a local system enables an attacker to browse a website offline; it also assists in finding directory structure and other valuable information from the mirrored copy without sending multiple requests to the web server.

25
Q

What do WEB MIRRORING tools do?

A

Web mirroring tools (like HTTrack Web Site Copier, and Cyotek WebCopy) allow you to download a website to a local directory, recursively building all directories, HTML, images, flash, videos, and other files from the server to your computer.

26
Q

What is the purpose of TRACKING EMAIL COMMUNICATIONS?

A

Attackers track emails to gather information about a target recipient, such as IP addresses, geolocation, browser and OS details, etc.

27
Q

What is the WHOIS LOOKUP?

A

Whois databases are maintained by the Regional Internet Registries and contain personal information of domain owners.

28
Q

What is the purpose of FINDING IP GEOLOCATION INFORMATION?

A

IP geolocation helps to identify information such as couuntry, region/state, city, ZIP/postal code, time zone, connection speed, ISP (hosting company), domain name, IDD country code, area code, mobile carrier, and elevation. Finding this information helps attackers with launching social engineering attacks, like spamming or phishing

29
Q

What does NETWORK RANGE INFORMATION tell an attacker?

A

Network range information assists attackers in creating a map of the target network.