CEHv8 BOOTCAMP: MODULE 04-ENUMERATION_SET-1 Flashcards

1
Q

What does the attacker do in the Enumeration phase?

A

Create active connections to system and performs directed queries to gain more information about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do attackers extract information?

A

To identify system attack points and perform password attacks to gain unauthorized access to information system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enumeration techniques are conducted in what kind of environment?

A

Intranet environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 6 enumeration techniques?

A
  • Extract user names using email IDs
  • Extract user names using SNMP
  • Extract user groups from windows
  • Extract information using default passwords
  • Brute force active directory
  • Extract information using DNS Zone Transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What service is UDP/TCP 53?

A

DNS Zone Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What service is UDP/TCP 135?

A

MS RPC Endpoint Mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What service is UDP/TCP 137?

A

NetBIOS Name Service (NBNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What service is UDP/TCP 139?

A

NetBIOS Session Service (SMB Over)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What service is TCP 445?

A

SMB Over TCP (Direct Host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What service is UDP 161?

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What service is UDP/TCP 389?

A

Lightweight Direct Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What service is UDP/TCP 3368?

A

Global Catalog Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What service is TCP 25?

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What service is UDP/TCP 162?

A

SNMP Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NetBIOS is a unique 16 ASCII character string used to identify what?

A

Identify the network devices over TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do attackers use NetBIOS enumeration to obtain?

A
  • List of computers that belong to a Domain.
  • List of shares on the individual host on the network.
  • Policies and passwords.
17
Q

What does Nbtstat display?

A

NetBIOS over TCP/IP (NetBT) protocol statistics NetBIOS name tables for both the local computer and remote computers and the NetBIOS name cache.

18
Q

What nbtstat command do you run to get the NetBIOS name table of a remote computer?

A

“nbtstat.exe –a ”

19
Q

What nbtstat command do you run to display the NetBIOS name cache, the table of NetBIOS names, and their resolved IP addresses?

A

“nbtstat.exe –c”

20
Q

What is SuperScan?

A

A connect based TCP port scanner, pinger, and host name resolver.

21
Q

What are 4 NetBIOS Enumeration Tools?

A
  • SuperScan
  • Hyena
  • Winfingerprint
  • NetBIOS Enumerator