CEHv8 BOOTCAMP: MODULE 03-SCANNING NETWORKS_SET-2 Flashcards
How can creating fragmented packets help attackers?
To bypass firewalls and IDS systems in a network.
IPv6 increases the IP address size from _____ to _____, to support more levels of addressing hierarchy.
32 bits to 128 bits.
With IPv6 why will traditional network scanning techniques be computationally less feasible?
Due to larger search space (64 bits of host address space 264 address) provided by IPv6 in a subnet.
Besides being more difficult to scan in IPv6 networks and complex than the IPv4, how else do IPv6 and IPv4 differ?
Major scanning tools such as Nmap do not support ping sweeps on IPv6 networks.
Where do attackers need to harvest IPv6 addresses from?
- Network traffic
- Recorded logs
- Received from
- And other header lines in archived email or Usenet news messages
Since IPv6 can offer a large number of hosts in a subnet, and if an attacker can compromise 1 host. What can the attacker probe?
The “all hosts” link local multicast address.
What can Network administrators use NMAP for?
- Network inventory
- Managing service upgrade schedules
- Monitoring host or service uptime
What kind of information can attackers use Nmap to extract?
- Live hosts on the network
- Services (application and version)
- Type of packet filter/firewalls
- Operating systems and OS versions
What Operating System(s) do Hping2/Hping3 run on?
- Windows
* Linux operating systems
What is Hping2/Hping3?
- Command line packet crafter for the TCP/IP protocol.
* Tool for security auditing and testing firewall and networks.
What are 8 scanning techniques?
- TCP Connect/Full Open Scan
- Stealth Scan
- IDLE Scan
- ICMP Echo Scanning/List Scan
- SYN/FIN Scanning Using IP Fragments
- UDP Scanning
- Inverse TCP Flag Scanning
- ACK Flag Scanning
What are 4 types of Stealth Scans?
- SYN Scan
- XMAS Scan
- FIN Scan
- NULL Scan
When a TCP Connect scan completes a 3-way handshake it can detect, what?
When a port is open.
A TCP Connect scan establishes a full connection and then tears it down by sending what packet?
A RST packet.
Why would an attacker use a Stealth Scan (Half-open Scan)?
- To bypass firewall rules.
- Logging mechanism.
- Hide themselves as usual traffic.