Aula 2 Flashcards
Footprinting via job sites, viable?
Yes, it is.
TTL near 128 = ?
Windows machine
TTL ~64 = ?
Linux machine
TTL ~255 = ?
Mac OS/ Solaris
Which hacking phase “scanning” process is?
PRE-ATTACK
Which hacking phase “scanning” process is?
PRE-ATTACK
nmap -p IP
-p = ????
specific (s) port (s) scanning
nmap -sV IP
-p = ????
Conteudo + versão, o que está rodando (serviço) e versão instalada/em execução
IP + Port + Protocol = ????????????
SOCKET
nmap -sn- PE network ???????????
Ping Sweep - a method to discover devices within a network as long as they are turned on and connected
nmap default scanning
HALF OPEN is the standard, it send SYN and receives an ACK, it doesn´t perform a THREE-WAY HANDSHAKE
TCP CONNECT/ FULL OPEN SCAN = ???
nmap with “-sT”
how to scan udp in nmap?
nmap with “-sU”, there is no 3-way handshake, it is DATAGRAM, needs to add WHICH PORT you want to scan, example:
nmap -sU -p 53 IP
port 53 = DNS
INVERSE TCP flag scan
Probe Packet FIN, URG, PSH, NULL, instead of SYN
Port Open? - NO response
Port Closed? - RST/ACK
hping3 -X - which flags?
FIN/URG/PSH = MERRY XMAS/ XMAS SCAN
XMAS SCAN works in a WIN machine?
NOOO, it works only in UNIX/LINUX machines, windows didn’t implement correctly RFC 793
nmap -O = ???????
descobrir SO do alvo
Packet fragmentantion with nmap
nmap “-f”
Source port manipulation with nmap
nmap “-g” IP or “source port”
nmap IP Address Decoy
nmap “-D” RND:10
or
nmap “-D” decoy1,decoy2…
used to evade IDS or Firewall
TCP/UDP 53
Domain Name System (DNS) Zone Transfer
TCP/UDP 135
Microsoft PC Endpoint Mapper
UDP 137
NetBIOS Name Service (NBNS)
TCP 139
NetBiOs Session Service (SMB ONr NeROS)
TCP/UDP 445
SMB Over TOP (Direct Host)
UDP 161
Simple Network Managiment Protocol (SNMP)
TCP/UDP 389
Lightweigh: Diroctory Access Protocol (LDAP)
TCP 2049
Network File System (NFS)
TCP 25
587 (Brazil)
Simple Mail Transfer Protocol (SMTP)
TCP/UDP 162
SNMP Trap
UDP 500
ISAKMP/internet Key Exchange (IKE)
TCP 22
Secure Shell (SSH)
Tree-based Vulnerability assessment approach
Indica: escaneia o alvo sem incorporar qualquer informação durante o scanning