CEHv8 BOOTCAMP: MODULE 04-ENUMERATION_SET-3 Flashcards
Describe the UNIX/LINUX Enumeration command “rpcclient”?
can enumerate usernames on LINUX and OS X
Describe the UNIX/LINUX Enumeration command “showmount”?
Finds the shared directories on the machine.
What is Lightweight Directory Access Protocol?
An internet protocol for accessing distributer directory services.
Network Time Protocol (NTP) is designed to, what?
Synchronize clocks of networked computers.
What port does NTP use?
UDP port 123
What valuable information does an attacker gather when they query a NTP server?
- List of hosts connected to NTP server
- Clients IP addresses in a network, their system names and Oss
- Internal IPs can also be obtained if NTP server is in the DMZ.
Describe the NTP Enumeration command “ntptrace”.
- Traces a chain of NTP servers back to the primary sources.
* ntptrace [-vdn] [-r retries] [-t timeout] [server]
Describe the NTP Enumeration command “ntpdc”.
- Monitors operation of the NTP daemon.
* /usr/bin/ntpdc [-n] [-v] host1 | IPaddress1…
Describe the NTP Enumeration command “ntpq”.
- Monitore NTP daemon ntpd operations and determines performance.
- Ntpq [-inp] [-c command] [host] […]
What are 3 built-in commands with SMTP?
- VRFY – Validates users
- EXPN – Tells the actual delivery addresses of aliases and mailing lists
- RCPT TO – Defines the recipients of the message
Using “nslookup”, what valuable network information can an attacker gather?
- DNS server names
- Hostnames
- Machine names
- User names
- IP addresses of the potential targets
What does an attacker try to retrieve during a DNS Zone Transfer Enumeration?
A copy of the entire zone file for a domain from a DNS server.
What are 5 SNMP enumeration countermeasures?
- Remove the SNMP agent or turn off the SNMP service.
- If shutting off SNMP is not an option, then change the default “public” community’s name.
- Upgrade to SNMP3.
- Implement the Group Policy security option called “Additional restrictions for anonymous connections”.
- Access to null session pipes, null sessions shares, and IPSec filtering should also be restricted.
What are 4 DNS enumeration countermeasures?
- Disable the DNS zone transfers to the untrusted host.
- Make sure that the private hosts and their IP addresses are not published into DNS zone files of public DNS server.
- Use premium DNS registration services that hide sensitive information such as HINFO from public.
- Use standard network admin contacts for DNS registrations in order to avoid social engineering attacks.
What are 3 SMTP enumeration countermeasures?
Configure SMTP servers to:
• Ignore email messages to unknown recipients.
• Not include sensitive mail server and local host information in mail responses.
• Disable open relay feature.