(5) DHCP Logs Server Config Files Flashcards

1
Q

How are DHCP logs useful in passive reconnaissance?

A

DHCP logs are useful in passive reconnaissance because one can ID many hosts on a network.

One can combine DHCP logs with firewall logs to figure out which hosts are provided with dynamic IP addresses and what hosts are using static IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where are DHCP logs found in Linux?

A

DHCP logs are normally found in Linux in the /var/log/dhcp.log or by using journalctl to view the logs, depending on distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do router and firewall configuration files normally contain?

A

Router and firewall configuration files normally contain information about successful and blocked connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is important to remember about firewall and router configuration files?

A

Router and firewall configuration files are very useful in that they can be clearly read to understand how systems interact with the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do firewall logs do for penetration testers?

A

Firewall logs allow pentesters to reverse engineer firewall rules based on the logs’ contents. Log files provide a good view of how traffic flows.

Firewall logs normally have a vendor specific firewall even log format that provides information based on the vendor’s logging standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Even though organizations use a wide variety of firewalls, there is one similarity amongst them all, what is it?

A

All firewalls provide a date/time stamp and details of the event in an understandable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do we need to remember about log file, what they contain, and their ease of access?

A

Log files provide information about systems, configurations, what apps are running on them, which user accounts are within the infrastructure, etc. but normally aren’t that easy to access because they are kept secure unless one is able to get admin access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly