Chapter 1 : Applying Reconnaissance Techniques Flashcards
Which of the following is not an example of reconnaissance or gathering information of
the target company through open source intelligence?
A. Using LinkedIn and other social media to gather email addresses of top executives
B. Performing passive reconnaissance by capturing packets and scanning ports
C. Monitoring job sites to learn what technologies are used
D. Performing DNS harvesting of company network data from external DNS servers
B is correct. Capturing packets and scanning ports are not examples of passive reconnaissance. Scanning ports is considering active reconnaissance. If your activities could create entries in a log, then those actions are not passive.
A is incorrect because LinkedIn is a site external to the company. You can interact with LinkedIn to gather information about a company without directly interacting with that company. Therefore, this is a form of open source intelligence gathering.
C is incorrect because, like LinkedIn, the job sites are presumed to be external to the company.
D is incorrect because DNS harvesting involves interacting with DNS servers outside the company’s DNS servers, versus interacting with internal DNS servers.
What is the name of the command-line version of Wireshark?
A. nmap
B. tcpdump
C. Nessus
D. TShark
D is correct. TShark is the command-line interface of Wireshark.
A is incorrect because nmap is a port scanning tool, not a command-line interface to Wireshark.
B is incorrect because, although tcpdump is indeed a packet capturing tool, it is not the command-line version of Wireshark.
C is incorrect because Nessus is a vulnerability scanning tool, not a command-line packet capturing tool.
You’re at an employee’s workstation. You need to quickly determine what other machines this system is talking to. You don’t have time to install extra tools. What command-line utility and command-line switch will reveal connections between this workstation and others?
A. tcpdump -i -eth0
B. nikto -host
C. netstat -a
D. nbtstat -A
C is correct. The utility netstat is on the workstation and is already a part of the operating system. Netstat is a command-line utility for viewing network statistics information, such as what connections and protocols are in use. The command-line switch -a will display all connections and listening ports.
A is incorrect because tcpdump is a packet capturing utility. The -i switch is for specifying an interface.
B is incorrect because Nikto is a utility for scanning web vulnerabilities. The command-line switch -host will set the target host by IP or hostname.
D is incorrect because the utility nbtstat informs you about NetBIOS connections. Although both nbtstat and netstat are available in most Windows versions, the utility netstat is best for determining all the current network connections.
You suspect an employee’s workstation may be the source of malicious traffic. Which of the following steps is the best course of action to determine both the type of traffic and this workstation’s participation in the traffic?
A. Set up packet capturing on a network device upstream from the workstation.
B. Set up packet capturing on the suspect workstation.
C. Set up packet capturing on a small group of servers identified as targets.
D. Install antivirus software on the suspect workstation.
B is correct. Capturing packets from the suspect workstation will yield complete information regarding this workstation as the source, thus demonstrating both the types of traffic and how the workstation fits into the situation.
A is incorrect because, although capturing packets is correct, capturing them from the network may miss traffic routed outside of the capturing device. The optimum location for capturing is on the workstation itself.
C is incorrect because capturing packets on a few targets would likely mean missing specific traffic to unknown targets.
D is incorrect because, although antivirus software might help identify malware, it might not help identify the type of traffic, nor will it answer whether the traffic is associated with any quarantined malware.
At a few employee workstations, including a suspect system, you bring up a command window and type arp -a to display the cached entries of hostnames and IP addresses, as well as those IPs resolved to a MAC address. At first glance, today’s entries seem normal. However, you know for a fact these MAC addresses are not how they were or should be. This illustration shows what the cache was before the suspicious behavior:
Notice the differences between the illustrations. From these differences, which is the suspect system and what technique is being used?
A. DNS poisoning, and both Alan and Gail’s systems are attacking.
B. ARP poisoning, and Alan’s system is the attacker.
C. ARP poisoning, and Gail’s system is the attacker.
D. ARP poisoning, and Sam’s system is the attacker.
D is correct. ARP poisoning is the technique, which is apparent by the changed ARP cache entries, and the second illustration shows Sam’s system as the new target MAC address for traffic intended for Gail and Alan’s systems. Thus, we can assume Sam’s system is the culprit.
A is incorrect because DNS poisoning or DNS spoofing involves spreading illegitimate DNS information, which isn’t evident in the illustration or mentioned in the text.
B and C are incorrect because the second illustration shows Sam’s system as the new MAC entry, not Alan’s or Gail’s.
Utilizing search sites as well as professional and social media sites with the goal of gathering contact information is an example of what?
A. CVSS
B. OSINT
C. Social engineering
D. Phishing
B is correct. OSINT, or open source intelligence, refers to gathering information about a target without directly interacting with that target’s infrastructure.
A is incorrect because CVSS stands for Common Vulnerability Scoring System, which is the industry standard method for ranking vulnerabilities.
C is incorrect because social engineering involves interacting with people, not websites.
D is incorrect because phishing involves e-mailing potential targets.
A small business is concerned about the threat of social media profiling on its employees. Which of the following actions could you take to best mitigate the threat?
A. Demonstrate phishing examples to the users.
B. Increase the level of detail in the system logs.
C. Review the social media application logs with management.
D. Review job site listings with HR and systems administrators.
A is correct. Phishing e-mails are a common result of targeted social media profiling.
Showing users the dangers of phishing might improve their social profiles.
B is incorrect because system logs provide no reflection of social media profiling.
C is incorrect because management already is aware of the problem, and reviewing application logs accomplishes little here.
D is incorrect because job site listings are not the problem.
Which of the following is not an example of a virtualization technology?
A. Containers
B. Software-defined networking
C. Mirroring
D. Hypervisors
C is correct. Mirroring describes a technique of fault tolerance in storage, or in the case of switch ports, it describes copying network traffic. Mirroring is not a virtualization technology.
A, B, and D are incorrect. Containers, software-defined networking (SDN), and hypervisors are all virtualization technologies.
Which of the following is a Type 2 hypervisor?
A. VMware Player
B. Microsoft Hyper-V
C. VMware ESX
D. Kernel-based Virtual Machine
A is correct. VMware Player is a Type 2 hypervisor, which means it runs from within an operating system.
B, C, and D are incorrect. Microsoft’s Hyper-V, VMware ESX, and Kernel-based Virtual Machine are all Type 1 hypervisors, also called bare-metal hypervisors because the software runs directly on the “bare metal” hardware, not within an OS.
Which of the following is not an actual cloud computing technology?
A. IaaS
B. SaaS
C. PaaS
D. SDN
D is correct. Although SDN (or software-defined networking) is a virtualization technology, it is not necessarily in the cloud.
A is incorrect because Infrastructure as a Service (IaaS) describes utilizing a complete infrastructure from a service provider.
B is incorrect because Software as a Service (SaaS) describes user access to specific applications from a service provider.
C is incorrect because Platform as a Service (PaaS) describes running a platform on top of a server operating system.
You are tasked with scanning across the network space 192.168.2.x and identifying what operating systems are presently running. Select the correct tool and command-line switch necessary to determine what operating systems are running on that subnet.
A. nikto -Version 192.168.2.0
B. nmap -O 192.168.2.0/24
C. syslog -network 192.168.2.0-192.168.2.254
D. netstat -a 192.168.2.0 /24
B is correct. Nmap is capable of detecting operating systems, and the command-line
syntax shown is correct.
A, C, and D are incorrect. The utilities nikto, syslog, and netstat are incapable of determining the operating systems.
Referring to Figure 1-1, select from the following actions what the person’s likely intentions are.
A. Assessing what web vulnerabilities are present
B. Inventorying the web configuration settings
C. Locating the host web server from the network
D. Reviewing the web server’s HTTP methods
A is correct. The tool shown is Nikto, a web vulnerability scanner. The person used Nikto to scan for vulnerabilities on the web server at address 192.168.2.19.
B is incorrect because web server configuration settings are not adequately collected.
C is incorrect because Nikto is not a network scanner, nor can it identify where is the web server is on a network.
D is incorrect because, although Nikto does show the HTTP methods, that’s not its intended purpose.
A company has suffered a recent incident where a print server was infected with malware and began aggressively scanning other machines on the network. The malware-infected server was identified only after a significant number of other machines were experiencing issues. Although the problem was contained, the timing was an issue. The company asks you to suggest how responding to problems like this could be done more quickly. What do you suggest?
A. The company should review the firewall rules for areas to improve.
B. The company should install an IDS on the network.
C. The company should install an IPS on the network.
D. The company should scan for further vulnerable print servers.
C is correct. An IPS would not only identify the problem but immediately react to contain or eliminate it.
A is incorrect because the problem was not described as originating from outside the firewall.
B is incorrect because, although an IDS would identify the problem, it would not address the company’s need for faster response.
D is incorrect because, although a good idea, vulnerability scanning would not address the company’s desire for fast response.
What is a primary challenge to using cloud storage versus on-premises storage?
A. On-premises storage doesn’t permit mobile access.
B. Expensive software licensing and hardware for cloud services.
C. Cloud resources put more emphasis on identity management.
D. Limited options for cloud computing.
C is correct. Identity management becomes ever more important when users are accessing resources away from your control.
A is incorrect because mobile access is not restricted to only cloud resources.
B is incorrect because a key benefit of services in the cloud is how inexpensive it is without the need to purchase hardware or upgrades.
D is incorrect because cloud computing can take many forms: Infrastructure as a Service, Platform as a Service, or simply Software as a Service.
Wireshark and tcpdump are examples of what kind of application?
A. Syslog aggregators
B. Packet analyzers
C. Intrusion detection systems
D. Port scanners
B is correct. Wireshark and tcpdump are packet capturing and analysis tools. Both will allow you to capture and view packets as well as perform varying levels of analysis on network traffic.
A, C, and D are incorrect. Neither Wireshark nor tcpdump perform as a syslog aggregator, an intrusion detection system, or a port scanner. Although Wireshark could technically be set to alert if a particular packet or part of a packet were captured, that is far from its intended purpose.