CEHv8 BOOTCAMP: MODULE 02-FOOTPRINTING AND RECONNAISSANCE_SET-2 Flashcards
Why do attackers track email communications?
To gather information about the physical location of an individual to perform social engineering that in turn may help in mapping target organization’s network.
What is email tracking?
A method to monitor and spy on the delivered emails to the intended recipient.
Competitive Intelligence is the process of what?
Identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the internet.
What is Competitive Intelligence in nature?
- Non-interfering
* Subtle
What are 10 sources of Competitive Intelligence?
- Company websites and employee ads.
- Search engines, internet, and online databases.
- Press releases and annual reports.
- Trade journals, conferences, and newspaper.
- Patent and trademarks.
- Social engineering employees.
- Product catalogues and retail outlets.
- Analyst and regulatory reports.
- Customer and vendor interviews.
- Agents, distributors, and suppliers.
What are 4 websites that can be used to find out how a company began and how it developed?
- EDGAR Database (http://www.sec.gov/edgar.shtml)
- Hoovers (http://www.hoovers.com)
- LexisNexis (http://www.lexisnexis.com)
- Business Wire (http://www.businesswire.com)
What are 6 things an attacker can gather using Google Hacking techniques?
- Advisories and server vulnerabilities.
- Pages containing network or vulnerability data.
- Pages containing logon portals.
- Error messages that contain sensitive information.
- Files containing passwords.
- Sensitive directories.
Who are WHOIS databases maintained by?
Regional Internet Registries.
What does a WHOIS query return?
- Domain name details.
- Contact details of domain owner.
- Domain name servers.
- NetRange.
- When a domain has been created.
- Expiry records.
- Records last updated.
How can information gathered from WHOIS databases help an attacker?
- Create detailed map of organizational network.
- Gather personal information that assists to perform social engineering.
- Gather other internal network details, etc.
What are the 5 Regional Internet Registries (RIR)?
- AFRINIC
- ARIN
- APNIC
- RIPE NCC
- LACNIC
What is SmartWHOIS?
A useful network information utility that allows you to look up all the available information about an IP address, hostname, or domain.
What can be determined by extracting DNS information?
Key hosts in the network and can perform social engineering attacks.
What are 10 DNS record types?
- A
- MX
- NS
- CNAME
- SOA
- SRV
- PTR
- RP
- HINFO
- TXT
Describe an “A” record.
Points to a host’s IP address.