2.2.2 Information gathering & Vulnerability scanning: active reconnaissance/ Detecting and Evading Defenses & Packet Crafting Flashcards

1
Q

Detecting and Evading Defenses: what is a load balancer ?

A

A core networking solution that distributes traffic across multiple servers inside a server farm. It allows multiple servers to answer as a single server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Detecting and Evading Defenses: what is a Load Balancer Detector (LBD) ?

A

Determines the presence of a load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Detecting and Evading Defenses: what issue can you have while scanning a network that have load balancers ?

A

Load balancers can throw off (fausser/perturber) scan results with increased false positives or false negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detecting and Evading Defenses: what is a firewall?

A

A type of network security device that monitors and filters incoming and outgoing network traffic. Relies on a set of rules known as an access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Detecting and Evading Defenses: while scanning a network, how to detects if an organization uses a firewall?

A

Use traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Detecting and Evading Defenses: what is Firewalk?

A

● An active reconnaissance tool that tries to determine what layer 4 protocols a given firewall will actually pass past it
● Lets you move through the firewall and identify the rule sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detecting and Evading Defenses: what is a Web Application Firewall (WAF)?

A

Utilizes specific rule sets to prevent common attacks against web applications, such as cross-site scripting and SQL injections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detecting and Evading Defenses: how to bypass a WAF?

A

Use obfuscation techniques to confuse these web applications such as
● Personalized cookies in HTTP packets
● Header alterations
● WAF notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detecting and Evading Defenses: what is an antivirus?

A

A specific type of software that is used to prevent, scan, detect, and delete viruses or malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detecting and Evading Defenses: how to bypass an antivirus (4)?

A

● Metamorphic virus
● Signature obfuscation
● Fileless malware
● Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet Crafting: what is it ?

A

A technique that allows for the generation of a network packet with the specific data content described by an attacker or penetration tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet Crafting: why should you use it?

A

● Setting up unusual TCP flags to see firewall response
● Fragmenting packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet Crafting: what are the different stages of packet crafting (4)?

A

1/ Assemble: creates a packet to be sent
2/ Edit: modifies the content of the created packet
3/ Play: sends or resends packet onto the network
4/ Decode: capture and analyzes traffic generated by the packet sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Packet Crafting: what methods can you use to craft a packet?

A

● Command line (Hping)
● GUI
● Script (Scapy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet Crafting: what is hping3 and why it is used by pentester?

A

An open-source spoofing tool that provides a pen tester with the ability to craft network packets to exploit vulnerable firewalls and IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packet Crafting: what can you do with hping3?

A
  • A powerful packet crafting tool
  • Customize any packet in any form
  • Bypass the firewall rules
  • Perform Port Scanning
  • Exploit the TCP / IP stack known vulnerabilities
17
Q

Packet Crafting: using hping3, what do you use for host/port detection and firewall testing?

A

Sends a SYN or ACK packet to conduct detection and testing

18
Q

Packet Crafting: explain this command “hping3 –S –p80 –c1 192.168.1.1”

A

Send 1 SYN packet to port 80

19
Q

Packet Crafting: what command would you be using to send 1 ACK packet to port 80 using hping3?

A

hping3 –A –p80 –c1 192.168.1.1

20
Q

Packet Crafting: what the timestamping is used for in hping3 and give the command line for using it

A
  • Timestamping is used to determine the system’s uptime.
  • For ex this command send 2 SYN packets to port 80 to determine uptime, hping3 –c2 –S p80 –tcp-timestamp 192.168.1.1
21
Q

Packet Crafting: can you traceroute with hping3 and why?

A

Yes you can, traceroute uses arbitrary packet formats, such as probing DNS ports using TCP or UDP, to perform traces when ICMP is blocked on a given network.

22
Q

Packet Crafting: how to set traceroute mode with hping3?

A

Add –traceroute in your hping3 command

23
Q

Packet Crafting: can you fragment the packet with hping3 and why?

A

Yes you can. It attempts to evade detection by IDS/IPS and firewalls by sending fragmented packets across the network for later reassembly

24
Q

Packet Crafting: how to set packet fragmentation mode with hping3?

A

Add -f in your hping3 command

25
Q

Packet Crafting: can you do a DoS with hping3 and why?

A

Yes you can. It can be used to perform flood-based DoS attacks from randomized source Ips

26
Q

Packet Crafting: what is the issue nowadays with using hping3 for DoS and fragmentation?

A

Fragmentation and DoS are not likely to be effective against most modern OS and network appliances

27
Q

Packet Crafting: what is Scapy?

A

A powerful, interactive packet manipulation tool, packet generator, network scanner, network discovery, packet sniffer, and more in one script.
o Scapy: Runs on Python 2
o Scapy 3: Runs on Python 3