Aula 2 Flashcards

1
Q

Footprinting via job sites, viable?

A

Yes, it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TTL near 128 = ?

A

Windows machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TTL ~64 = ?

A

Linux machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TTL ~255 = ?

A

Mac OS/ Solaris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which hacking phase “scanning” process is?

A

PRE-ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which hacking phase “scanning” process is?

A

PRE-ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

nmap -p IP

-p = ????

A

specific (s) port (s) scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

nmap -sV IP

-p = ????

A

Conteudo + versão, o que está rodando (serviço) e versão instalada/em execução

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP + Port + Protocol = ????????????

A

SOCKET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

nmap -sn- PE network ???????????

A

Ping Sweep - a method to discover devices within a network as long as they are turned on and connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

nmap default scanning

A

HALF OPEN is the standard, it send SYN and receives an ACK, it doesn´t perform a THREE-WAY HANDSHAKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP CONNECT/ FULL OPEN SCAN = ???

A

nmap with “-sT”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to scan udp in nmap?

A

nmap with “-sU”, there is no 3-way handshake, it is DATAGRAM, needs to add WHICH PORT you want to scan, example:

nmap -sU -p 53 IP

port 53 = DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

INVERSE TCP flag scan

A

Probe Packet FIN, URG, PSH, NULL, instead of SYN

Port Open? - NO response

Port Closed? - RST/ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

hping3 -X - which flags?

A

FIN/URG/PSH = MERRY XMAS/ XMAS SCAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XMAS SCAN works in a WIN machine?

A

NOOO, it works only in UNIX/LINUX machines, windows didn’t implement correctly RFC 793

16
Q

nmap -O = ???????

A

descobrir SO do alvo

17
Q

Packet fragmentantion with nmap

A

nmap “-f”

18
Q

Source port manipulation with nmap

A

nmap “-g” IP or “source port”

19
Q

nmap IP Address Decoy

A

nmap “-D” RND:10

or

nmap “-D” decoy1,decoy2…

used to evade IDS or Firewall

20
Q

TCP/UDP 53

A

Domain Name System (DNS) Zone Transfer

21
Q

TCP/UDP 135

A

Microsoft PC Endpoint Mapper

22
Q

UDP 137

A

NetBIOS Name Service (NBNS)

23
Q

TCP 139

A

NetBiOs Session Service (SMB ONr NeROS)

24
Q

TCP/UDP 445

A

SMB Over TOP (Direct Host)

25
Q

UDP 161

A

Simple Network Managiment Protocol (SNMP)

26
Q

TCP/UDP 389

A

Lightweigh: Diroctory Access Protocol (LDAP)

27
Q

TCP 2049

A

Network File System (NFS)

28
Q

TCP 25
587 (Brazil)

A

Simple Mail Transfer Protocol (SMTP)

29
Q

TCP/UDP 162

30
Q

UDP 500

A

ISAKMP/internet Key Exchange (IKE)

31
Q

TCP 22

A

Secure Shell (SSH)

32
Q

Tree-based Vulnerability assessment approach

A

Indica: escaneia o alvo sem incorporar qualquer informação durante o scanning