(5) Pings, Port Scans, And Device Fingerprinting Flashcards

1
Q

What is the ping command?

A

The ping command is a low level network command that sends an echo request to a remote IP address. It uses Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do we need to remember about ping commands and the potential echo replies?

A

If an echo reply doesn’t come back, it doesn’t mean that the remote host isn’t there. Firewalls block ping requests, and individual systems might be set up to ignore echo packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hping?

A

Hping is an advanced version of ping that lets one customized echo request to increase the chance of detection. handcrafted packets can be constructed here as part of a penetration test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are port scanning tools designed to do?

A

Port scanning tools are designed to send traffic to remote systems and then get responses that give info about systems and services that they provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the common features of port scanners?

A

Common features or port scanners include:

-Host discovery
-Port scanning and service identification
-Device fingerprinting
-Service version identification
-Operating system identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can basic knowledge of how to read a scan is particularly useful?

A

The basic knowledge that is useful is that scans provide info about hosts on the network, running services, and clues about if they are vulnerable to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is operating system fingerprinting?

A

Operating system fingerprinting is identifying an operating system based on the network traffic that it sends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Summarize the basic idea of what operating system fingerprinting does

A

Operating system fingerprinting is usually done by utilizing TCP/IP stack fingerprinting techniques that focus on comparing responses to TCP and UDP packets sent to remote hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is device fingerprinting?

A

Device fingerprinting is about the collection and relation of information about a device including details about software, services, and operating system(s) that it runs on that allows for identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is device fingerprinting particular useful for?

A

Device fingerprinting is particularly useful for identifying printers and other networked devices but can identify others well too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can devices still be fingerprinted if they are firewalled?

A

Devices can still be fingerprinted even if they are firewalled if access to their network traffic and network device logs is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly