Chap 3 Flashcards
What is network reconnaissance and discovery?
Mapping out the attack surface
What is Topology discovery/ footprinting?
Scanning hosts, IP ranges, and routers between networks to map out the structure of the target network typically using command line tools.
What tools are used to test routing config and connectivity with remote hosts and networks?
- Route
- tracert (Windows)
- traceroute (Linux)
- pathping (windows) / mtr (Linux)
What is a SNMP?
Simple Network Management Protocol is a management protocol.
What is the Nmap Security Scanner?
One of the most popular open-source IP scanners ( shows open ports on a connection)
What is service discovery?
To discover what OS is running, which network services each host is running and potentially which app software is underpinning the services.
Service discovery scan options?
- TCP SYN (-sS)
- UDP scans (-sU)
- Port range (-p)
What is TCP SYN (-sS)?
A service discovery option that is the fastest technique aka half-open scanning.
What is are UDP scans (-sU)?
scan UDP ports.
What are Port ranges?
Allows for NMAP to select a port range instead of the default 1000 commonly used ports.
What is fingerprinting?
Detailed analysis of services on a particular host
What is banner grabbing?
The process of scanning software to guess art the software name and version, without having any sort of privileged access to the host.
What information can be gathered by using the -sV or -A command in NMAP?
- Protocol
- Application name and version
- OS type and version
- Device type
What is CPE
Common Platform Enumeration which is the standard syntax used to classify fingerprinting signatures in NMAP.
What is netstat?
Shows the local state of TCP/UDP ports on local machines .
What is Linux version of nslookup?
Dig
What is the Harvester tool used for?
Tool for gathering open-source intelligence for a particular domain or company name.
What is the curl command?
command-line client for performing data transfers over many types of protocols.
What is Nessus?
One of the best-known commercial vulnerability scanners.
What is Packet analyzing?
deep-down frame-by-frame scrutiny of captured frames
What is protocol analyzing?
Using statistical tools to analyze a sequence of packets or packet trace.
What type of file is used for packet captures?
.pcap
What is Wireshark?
Open source graphical packet capture and analysis utility, with installer packages for most OS’s.
What does Fellow TCP Stream do?
Reconstructs the packet contents for a TCP session.
What are some well known packet injection tools?
- Dsniff
- Ettercap
- SCapy
- hping
What is hping?
An open-source spoofing tool that provides a penetration tester with the ability to craft network packets to exploit vulnerable firewalls and IDSs.
What does TCPreplay do?
It takes previously captured traffic that has been saved to a .pcap file and replays it through a network interface.
What is a RAT?
Remote Access Trojan is malware that gives an adversary the means of remotely accessing the network.
How does an exploitation framework expolit?
By using the vulnerabilities identified by an automated scanner and launching scripts or software to attempt to deliver matching exploits.
Can also inject malicious code past an IDSs and AVs
What is the best-known exploit?
Metasploit
What is Sn1per?
A framework designed for penetration test reporting and evidence gathering.
Name other exploitation frameworks besides Sn1per and Metasploit?
- fireELF
- RouterSploit
- Browser Exploitation Framework (BeEF)
- Zed Attack Proxy (ZAP)
- Pacu