8.3 Following Data Through Layers 2, 3, and 4 Flashcards
Both hackers and security pros will use the method of __________ to gather data from a specific network in order to gain access to that network.
Both hackers and security pros will use the method of footprinting to gather data from a specific network in order to gain access to that network.
Footprinting can yield what information:
Physical addresses of devices within a network.
The IPs and ports that are being used or are accessible.
Network and network security devices being used.
Data is routed via switches to a physical machine address, known as a ____________________
Data is routed via switches to a physical machine address, known as a Media Access Control (MAC) address
A sequence of numbers such as 00:0c:29:0f:71:a3 that identifies the destination computer’s unique hardware number.
is called what?
Media Access Control (MAC) address
A sequence of numbers such as 00:0c:29:0f:71:a3 that identifies the destination computer’s unique hardware number.
is called what?
Media Access Control (MAC) address
To ensure data gets from LAN to machine, the ____________ maps the ___________ to an ____________ within the LAN.
The Address Resolution Protocol (ARP) maps the MAC address to an IP address within the LAN.
Entries added to the ARP cache are called ___________, meaning they can be changed with future ARP replies.
Entries added to the ARP cache are called dynamic ARP entries, meaning they can be changed with future ARP replies.
Dynamic ARP entries will only stay in the ARP cache for a limited period of time known as the ARP cache timeout.
When the ARP cache timeout expires, the record is removed from the ARP cache and any future requests for the host require a new ARP request.
ARC Spoofing
True or False
The hacker can send a spoof ARP message to the LAN, directing all traffic intended for the good host to the hacker’s MAC address.
True
After the attacker sends the spoof ARP message, all traffic originally destined for the good host is intercepted by the hacker’s device with the malicious MAC address.
True or False
Wireshark can detect and alert multiple MAC addresses associated with a single IP address, but it will not take any action on its own.
True
Instead, to counter ARP spoofing, a network administrator can create static ARP entries.
Static ARP Entries
True or False
Static ARP entries create permanent IP-to-MAC-address mappings in the ARP cache.
True
Unlike the dynamic ARP entries, these cannot be changed.
When footprinting, it’s important to check if an external host is _____________.
When footprinting, it’s important to check if an external host is operating and accepting connections.
What does ping stand for and what is it?
ping (Packet Inter-Network Groper) is a utility used to determine if a host is operating and accepting requests.
When we ping a host, it sends an _____________ echo request to a specific IP address and waits on a reply.
When we ping a host, it sends an Internet Control Message Protocol (ICMP) echo request to a specific IP address and waits on a reply.
ICMP is a protocol that network devices use to send error messages and operational information about whether a requested service or host can be reached.
What switch do use with ping to limit the results?
-c
Ex.
ping -c pepsi.com
What does this command do?
fping -s -g 107.191.96.26 107.191.96.32
Using fping will ping a range of IPs
What is traceroute?
Traceroute is a network diagnostic tool used to track in real-time the pathway taken by a packet on an IP network from source to destination, reporting the IP addresses of all the routers it pinged in between. Traceroute also records the time taken for each hop the packet makes during its route to the destination.
True or False
When data travels from a source to a destination, it typically follows a straight path.
When data travels from a source to a destination, it typically doesn’t follow a straight path.
Redirection of data transmissions are called ________.
Redirection of data transmissions are called hops.