16.2 Student Guide: Network Discovery and Vulnerability Flashcards
What are the 5 phases of engagement?
- Active and passive reconnaissance
- Scanning and enumeration
- Gaining access
4 . Maintaining access - Covering your tracks
_______ and _______ are essential to the early stages of an engagement.
Network discovery and vulnerability scanning are essential to the early stages of an engagement.
Network discovery and vulnerability scanning are essential to the early stages of an engagement. With the proper tools, we can complete the following tasks: (4)
**Network mapping:** Using host discovery, we can identify network devices like servers, switches, and routers, and how how they’re physically interconnected.
**Service discovery:** Allows us to identify which services are running on which hosts, such as DNS, mail, or web servers.
**OS detection:** Also known as OS fingerprinting, lets us detect which operating system is running on a networked device, such as OS name, vendor, software versions, and estimated device uptime.
**Security auditing:** The discovery process of finding OS versions and apps running on hosts to determine the depth of vulnerabilities.
How might an attacker benefit from knowing what version of service is running on a host?
An attacker can research all documented vulnerabilities for the specific application services and versions running on a host or server.
______, _______, is a free, open-source tool used for network discovery and vulnerability scanning.
**Nmap**, short for Network Mapper, is a free, open-source tool used for network discovery and vulnerability scanning.
Nmap is useful for identifying devices running on a network, discovering hosts, services, open ports, and IP addresses, and detecting security risks.
What are the most common Nmap functions? (6)
- Ping scans
- Port scans
- Host scans
- OS fingerprinting
- Top port scans
- Outputting scan results to files
What is the command to perform a TCP connect scan with Nmap?
nmap -sT [target IP]
What is the command to perform a service and version detection scan with Nmap?
nmap -sV [target IP]
What web service vulnerability is associated with
Apache httpd 2.2.8 ((Ubuntu) DAV/2)
One possible vulnerability is CVE-2016-4975 (possible CRLF injection), which allows HTTP response splitting attacks for sites that use mod_userdir
What vulnerability is associated with Google VSFTPD v2.3.4?
VSFTPD v2.3.4 is vulnerable to backdoor command execution, which presents a threat to organizations running this particular version of software.
Knowing the web server type and version number allows an attacker to __________.
Knowing the web server type and version number allows an attacker to compile a list of potential vulnerabilities to exploit.
Most malicious actors will not choose to use what type of Nmap scan?
TCP full-connect (nmap -sT) scans are aggressive and noisy and will, in most cases, generate alarms on the targeted network that alert the target to your presence. Attackers prefer to use the SYN half-connect scan, which we’ll cover next.
The _______ allows users to write and share scripts that automate a variety of networking tasks.
The Nmap Scripting Engine (NSE) allows users to write and share scripts that automate a variety of networking tasks.
You can use NSE scripting for any of the following tasks: (8)
- DNS enumeration
- Brute force attack
- OS fingerprinting
- Banner grabbing
- Vulnerability detection
- Vulnerability exploitation
- Backdoor identification
- Malware discovery
While NSE scripts can serve multiple functions, most exist to _________.
While NSE scripts can serve multiple functions, most exist to gather information on a target.