CEHv8 BOOTCAMP: MODULE 02-FOOTPRINTING AND RECONNAISSANCE_SET-1 Flashcards

1
Q

What is Open Source (Passive) Information Gathering?

A

Collecting information about a target from the publicly accessible sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Anonymous Footprinting?

A

Gathering information from sources where the author of the information can’t be identified or traced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Organizational (Private) Footprinting?

A

Collecting information from an organizations web-based calendar and email services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Active Information Gathering?

A

Gathering information through social engineering on-site visits, interviews, and questionnaires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pseudonymous Footprinting?

A

Collecting information that might be published under a different name in an attempt to preserve privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Footprinting?

A

Collecting information about a target from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Footprinting?

A

The process of collecting as much information as possible about a target network, for identifying various ways to intrude into an organization’s network system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the processes involved in Footprinting a target?

A
  • Collect basic information about the target and it’s network.
  • Determine the OS used, platforms running, web server versions, etc.
  • Perform techniques such as WHOIS, DNS, network and organizational queries.
  • Find vulnerabilities and exploits for launching attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 4 things that Footprinting does for an attacker?

A
  • Know Security Posture
  • Reduced Attack Area
  • Build Information Database
  • Draw Network Map
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 objectives of Footprinting?

A
  • Collect Network Information
  • Collect System Information
  • Collect Organization’s Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What information can be gathered when collecting Network Information?

A
  • Domain name
  • Internal Domain names
  • Network blocks
  • IP addresses of the reachable systems
  • Rogue websites/private websites
  • TCP and UDP services running
  • Access control Mechanisms and ACL’s
  • Network Protocols
  • VPN Points
  • ACL’s
  • IDS’s running
  • Analog/Digital telephone numbers
  • Authentication mechanisms
  • System Enumeration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information can be gathered when collecting System Information?

A
  • User and group names
  • System banners
  • Routing tables
  • SNMP Information
  • System architecture
  • Remote system type
  • System names
  • Passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What information can be gathered when Collecting Organization’s Information?

A
  • Employee details
  • Organization’s website
  • Company Directory
  • Location details
  • Address and phone numbers
  • Comments in HTML source code
  • Security Policies Implemented
  • Web server links relevant to the organization
  • Background of the organization
  • News articles/press releases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can an attacker gather from Footprinting techniques?

A

Valuable system and network information such as account details, operating system and installed applications, network components, server names, database schema details, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 6 types of Footprinting Threats?

A
  • Social Engineering
  • System and Network Attacks
  • Information Leakage
  • Privacy Loss
  • Corporate Espionage
  • Business Loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What information can be collected through use of Footprinting through Search Engines?

A
Information about a target such as:
•	Technology platforms
•	Employee details
•	Login pages
•	Intranet  portals, etc.
17
Q

What can search engines provide?

A

Sensitive information that has been removed from the World Wide Web (WWW).

18
Q

What can the information collected from a target’s website enable an attacker to do?

A

To build a detailed map of website’s structure and architecture.

19
Q

What do web mirroring tools allow you to do?

A
  • Download a website to a local directory.
  • Building recursively all directories.
  • HTML.
  • Images.
  • Flash
  • Videos
  • And other files from a computer.
20
Q

What can mirroring an entire website can enable an attacker to do?

A
  • Dissect and identify vulnerabilities.

* Assists in finding directory structure and other valuable information without multiple requests to web servers.

21
Q

Where can you find archived versions of websites?

A

http://www.archive.org

22
Q

What does Website Watcher do?

A

Automatically checks website pages for updates and changes.