(5) Service/Version ID, Common Tools Flashcards

1
Q

Why is service identification important?

A

Service identification is important because it provides information about potential vulnerabilities and helps verify that the service that is responding on a particular port matches the service that normally is used on that port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two typical ways that service identification is done?

A

Service identification is normally done via connection and through grabbing the banner or connection information provided by the service or by comparing responses to the signatures of known services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is maltego?

A

Maltego is open sourced, it focuses on open source intelligence gathering and connecting data points together via a graphical user interface (GUI).

It is a good way to understand, document, correlate and discover the hierarchies of the network you are looking at.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how maltego uses the concepts of transforms

A

Transforms are actions taken by a server that provide more data or processing about objects and entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is recon-ng?

A

it is a module reconnaissance tool. Uses a CLI with search and module selection and install abilities that allow you to customize it to your liking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is passive analysis?

A

Passive analysis is about getting information that is available about the organization, system, or network without performing any probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is passive fingerprinting?

A

Passive fingerprinting is about logs and certain other existing data, which might not provide enough data. The data may also be out of date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How useful are log files when it comes to passive discovery/analysis?

A

If you can get to local system configuration data and logs, you can use this information to build a map of how systems work together, what users and systems are there, and how they are set up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to passive discovery and analysis, what type of data can one get from network devices?

A

Network devices contain data such as

-logs
-status and events
-traffic patterns and usage
-network device configuration files
-network flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In general, how do network devices generate log messages?

A

Many network devices log messages directly to their console ports, meaning only a user logged in at the console can get to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When it comes to managed networks, how do managed networks send network logs?

A

Most managed networks send network logs to a central log server using the syslog utility.

Many network logs level Simple Network Management Protocol (SNMP) to send device information to a central control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do network device log files have associated with them?

A

network device log files often have a log level associated with them. The definitions vary from device to device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name Cisco system log levels from level 0-3

A

Level 0 is emergencies such as device shutdowns due to failure

Level 1 is alerts, such as Temperature issues

Level 2 is for critical, such as if software has issues

Level 3 is for errors such as if interfaces are having trouble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name Cisco log levels from 4-7

A

Level 4 is for warnings such as if configurations have been changed without approval

Level 5 is for notifications such as if a line protocol is working or not working

Level 6 is for information perhaps is an ACL is being violated

Level 7 is for debugging, like for debugging messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compared to network device logs, what type of information is even more useful?

A

Network device logs are actually not as useful as device config data when it comes to intelligence gathering, it can provide topology discovery data though

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During penetration tests, what can network device logs be useful for?

A

Network device logs can be useful during pentests in that they can provide a heads up or reveal config/system problems

17
Q

how useful are configuration files when it comes to mapping network topologies?

A

Configuration files are very useful when it comes to mapping network topologies, they include details about syslog and SNMP devices, admin and user info, and configuration bits that are used as part of info gathering

18
Q

What do configuration files include in terms of details of the network?

A

Configuration files include details such as routes, systems, systems that the devices talk to, etc.

19
Q

What is netflow?

A

Netflow is a Cisco network protocol that collects IP traffic info, which helps with traffic monitoring

20
Q

When it comes to Netflow, what is flow data useful for?

A

Flow data provides a view of traffic flow and volume. Typical flow data has IP and port source and destination for traffic and class of service

21
Q

What can netflows and netflow analyzers help with?

A

Netflows and netflow analyzers can help identify service issues and baseline what network behavior usually is like and can help figure out unusual behaviors

22
Q

What is netstat?

A

Netstat is a tool that helps gather local host network information in Windows, Linux and macOS

23
Q

What information does net state provide?

A

Active TCP and UDP connections, filtered by major protocols (TCP, UDP, ICMP, IP, IPv6, etc)

What executable file created a connection (or its process ID)

Ethernet statistics (on how many bytes and packets have been sent and received)

Route table information (including IPv4 and IPv6, obtained using the -nr flag)

24
Q

Within netstat, what info in Windows can be retrieved with the -nr flag?

A

The -nr flag can get information on the destination network, netmask, gateway, the interface the route is associated with and a metric for the route that captures link speed, etc.

25
Q

What two main points of data does netstat provide?

A

Netstat provides data on the machine’s network actions and what the local network looks like