4 - FootPrinting and Social Engineering Flashcards

1
Q

What is ‘casing the joint’

A

– Look over the location
– Find weakness in security systems
– Types of locks and alarms used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is footprinting?

A

Finding information on company’s network. It can be Passive and nonintrusive eg. you aren’t accessing information illegally or gathering unauthorized information with false credentials
– Several available Web tools eg. Google groups, FOCA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Conducting Competitive Intelligence

A

A means of gathering information about a business or an industry
by using observation, accessing public information, speaking with employees, and so on.
As a security tester you should be able to explain methods used to gather information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Analyzing company’s website

A
Easy way for attackers to discover critical information about an organization.
Tools: 
Paros
- Powerful tool for UNIX and Windows OSs
- Requires Java J2SE
Whois
- Commonly used
- Gathers IP address and domain information
- Attackers can also use it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you use email addresses?

A
  • Help retrieve even more information
  • You can find e-mail address format and guess other employees’ e-mail accounts
  • Tool to find corporate employee information: Groups.google.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HTTP operates on port ____

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name a HTTP method

A

GET/ HTTP/1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a HTTP command

A

A security tester can pull information from a Web server by using HTTP commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Other methods of gathering information?

A
A URL:
– Web server
– OS
– Names of IT personnel
Other methods:
– Cookies
– Web bugs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Social Engineering?

A

“Why try to crack a password when you can simply ask for it?”

Using an understanding of human nature to get information from people. eg. Obtaining passwords/personal information through different tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tactics used in social engineering?

A

– Persuasion
– Intimidation
– Coercion
– Extortion/blackmailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineers study human behavior.

A

They can recognise personality traits such as shyness or insecurity, they can also understand body language such as slouched shoulders, avoidance of eye contact, nervous fidgeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

5 Techniques?

A
  1. Urgency
  2. Quid pro quo
  3. Status quo
  4. Kindness
  5. Position
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoulder surfing

A

Skilled at reading what users enter on their keyboards, especially logon names and password. eg. PINs at ATM machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tools used for shoulder surfing

A
  • ## Binoculars or high-powered telescopes to observe PINs being entered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent shoulder surfing?

A
  • Educate users to avoid typing when someone is nearby or talking on cell phone nearby.
  • Make sure all computer monitors face away from the door or the cubicle
    entryway
17
Q

What is dumpster diving?

A
Attacker examines and finds information in victim’s trash. eg.
– Discarded computer manuals
– Passwords jotted down
– Company policy
– Utility bills
– Resumes
18
Q

How to prevent dumpster diving?

A
  • Educating your users on the importance of proper trash disposal
    – Format disks before disposing them
    – Discard computer manuals offsite
    – Shred documents before disposal
19
Q

What is piggybacking?

A

A method attackers use to gain access to restricted areas in a company. The
attacker follows an employee closely and enters the area with that employee

20
Q

How to prevent piggybacking?

A
  • Use turnstiles
    – Train personnel to notify security about strangers
    – Do not hold secured doors for anyone, even people they know
    – All employees must use access cards
21
Q

Phishing

A

A type of attack carried out by e-mail; e-mails includes links to fake Web sites intended to entice victims into disclosing private information or installing malware

22
Q

What is DNS?

A

Domain Name System (DNS) resolves host names to IP addresses

23
Q

What is Zone transfer

A

It can be used to get information about a network’s topology and view all the network’s host computers and domains.

24
Q

Determine a company’s primary DNS server,

A

You can look for a DNS server containing a Start of Authority (SOA) record. You can perform another zone transfer to see all host computers on the company network