6B: Evaluate Network Traffic Flashcards
2.2 Given a scenario, perform active reconnaissance. 2.3 Given a scenario, analyze the results of a reconnaissance exercise. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
A protocol which provides a framework for name resolution, registration, and conflict detection on a LAN.
NetBIOS
Any location, such as a system or network in an organization, that stores, transmits, or processes cardholder data.
Cardholder Data Environment (CDE)
Broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment.
Address Resolution Protocol (ARP)
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
ARP Poisoning