CEHv8 BOOTCAMP: MODULE 03-SCANNING NETWORKS_SET-2 Flashcards

1
Q

How can creating fragmented packets help attackers?

A

To bypass firewalls and IDS systems in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPv6 increases the IP address size from _____ to _____, to support more levels of addressing hierarchy.

A

32 bits to 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With IPv6 why will traditional network scanning techniques be computationally less feasible?

A

Due to larger search space (64 bits of host address space 264 address) provided by IPv6 in a subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Besides being more difficult to scan in IPv6 networks and complex than the IPv4, how else do IPv6 and IPv4 differ?

A

Major scanning tools such as Nmap do not support ping sweeps on IPv6 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where do attackers need to harvest IPv6 addresses from?

A
  • Network traffic
  • Recorded logs
  • Received from
  • And other header lines in archived email or Usenet news messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Since IPv6 can offer a large number of hosts in a subnet, and if an attacker can compromise 1 host. What can the attacker probe?

A

The “all hosts” link local multicast address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can Network administrators use NMAP for?

A
  • Network inventory
  • Managing service upgrade schedules
  • Monitoring host or service uptime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of information can attackers use Nmap to extract?

A
  • Live hosts on the network
  • Services (application and version)
  • Type of packet filter/firewalls
  • Operating systems and OS versions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Operating System(s) do Hping2/Hping3 run on?

A
  • Windows

* Linux operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Hping2/Hping3?

A
  • Command line packet crafter for the TCP/IP protocol.

* Tool for security auditing and testing firewall and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 8 scanning techniques?

A
  • TCP Connect/Full Open Scan
  • Stealth Scan
  • IDLE Scan
  • ICMP Echo Scanning/List Scan
  • SYN/FIN Scanning Using IP Fragments
  • UDP Scanning
  • Inverse TCP Flag Scanning
  • ACK Flag Scanning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 4 types of Stealth Scans?

A
  • SYN Scan
  • XMAS Scan
  • FIN Scan
  • NULL Scan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a TCP Connect scan completes a 3-way handshake it can detect, what?

A

When a port is open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A TCP Connect scan establishes a full connection and then tears it down by sending what packet?

A

A RST packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why would an attacker use a Stealth Scan (Half-open Scan)?

A
  • To bypass firewall rules.
  • Logging mechanism.
  • Hide themselves as usual traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Stealth scan process?

A
  • Client sends a single SYN packet to the server on the appropriate port.
  • If the port is Open then the server response with a SYN/ACK packer.
  • If the server responds with a RST packet, then the remote port is in the Closed state.
  • The client sends the RST packet to close the initiation before a connection can ever be established.
17
Q

What flags are set during a XMAS scan?

A
  • URG
  • ACK
  • RST
  • SYN
  • PSH
  • FIN
18
Q

How do FIN scans work?

A

Attackers send a TCP frame to a remote host with only FIN flags set.

19
Q

What is indicated when a FIN scan returns no response?

A

Port is Open.

20
Q

What is indicated when a FIN scan returns a RST/ACK?

A

Port is Closed.

21
Q

How do NULL scans work?

A

Attacker sends a TCP frame to a remote host with NO Flags