CEHv8 BOOTCAMP: MODULE 04-ENUMERATION_SET-3 Flashcards

1
Q

Describe the UNIX/LINUX Enumeration command “rpcclient”?

A

can enumerate usernames on LINUX and OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the UNIX/LINUX Enumeration command “showmount”?

A

Finds the shared directories on the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Lightweight Directory Access Protocol?

A

An internet protocol for accessing distributer directory services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Time Protocol (NTP) is designed to, what?

A

Synchronize clocks of networked computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does NTP use?

A

UDP port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What valuable information does an attacker gather when they query a NTP server?

A
  • List of hosts connected to NTP server
  • Clients IP addresses in a network, their system names and Oss
  • Internal IPs can also be obtained if NTP server is in the DMZ.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the NTP Enumeration command “ntptrace”.

A
  • Traces a chain of NTP servers back to the primary sources.

* ntptrace [-vdn] [-r retries] [-t timeout] [server]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the NTP Enumeration command “ntpdc”.

A
  • Monitors operation of the NTP daemon.

* /usr/bin/ntpdc [-n] [-v] host1 | IPaddress1…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the NTP Enumeration command “ntpq”.

A
  • Monitore NTP daemon ntpd operations and determines performance.
  • Ntpq [-inp] [-c command] [host] […]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 3 built-in commands with SMTP?

A
  • VRFY – Validates users
  • EXPN – Tells the actual delivery addresses of aliases and mailing lists
  • RCPT TO – Defines the recipients of the message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using “nslookup”, what valuable network information can an attacker gather?

A
  • DNS server names
  • Hostnames
  • Machine names
  • User names
  • IP addresses of the potential targets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does an attacker try to retrieve during a DNS Zone Transfer Enumeration?

A

A copy of the entire zone file for a domain from a DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 5 SNMP enumeration countermeasures?

A
  • Remove the SNMP agent or turn off the SNMP service.
  • If shutting off SNMP is not an option, then change the default “public” community’s name.
  • Upgrade to SNMP3.
  • Implement the Group Policy security option called “Additional restrictions for anonymous connections”.
  • Access to null session pipes, null sessions shares, and IPSec filtering should also be restricted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 4 DNS enumeration countermeasures?

A
  • Disable the DNS zone transfers to the untrusted host.
  • Make sure that the private hosts and their IP addresses are not published into DNS zone files of public DNS server.
  • Use premium DNS registration services that hide sensitive information such as HINFO from public.
  • Use standard network admin contacts for DNS registrations in order to avoid social engineering attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 3 SMTP enumeration countermeasures?

A

Configure SMTP servers to:
• Ignore email messages to unknown recipients.
• Not include sensitive mail server and local host information in mail responses.
• Disable open relay feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 LDAP enumeration countermeasures?

A
  • Use NTLM or basic authentication to limit access to known users only.
  • Use SSL technology to encrypt the traffic. (By default , LDAP traffic is transmitted unsecure).
  • Select a user name different from your email address and enable account lockout.
17
Q

What are the 4 steps to disable SMB?

A
  • Go to Ethernet Properties.
  • Select the Client for Microsoft Networks and File and Printer Sharing for Microsoft Networks check boxes.
  • Click Uninstall.
  • Follow the uninstall steps.
18
Q

Enumeration Pen Testing is used to identify what?

A

Valid user accounts or poorly protected resource shares using active connections to systems and directed queries.

19
Q

What is the first step in Enumeration Pen Testing?

A

Find the network range.

20
Q

What is the last step in Enumeration Pen Testing?

A

Document findings.