Chapter 3, reconnaissance and intelligence gathering Flashcards
Domain 1.0 Threat and vulnerability management 1.4 given a scenario, analyze the output from common vulnerability assessment tools Domain 3.0 Security Operations and Monitoring 3.1 given a scenario, analyze data as part of monitoring activities
what is the first step when gathering organizational intelligence?
identifying the organization’s technical footprint.
Host enumeration creates a map of an organizations networks, systems and other infrastructure. Active reconnaissance uses ___ ____ ____ to help achieve this
host scanning tools
Testers can gain an understanding of the network topology based on the ? and other network responses
time to live
what can stop nmap getting results from the network? How else might you get the information?
firewalls can stop traffic
you can try passive footprinting instead
When laying out the systems discovered in a scan, it is important to lay them out according to what and what?
the network addresses and TTL
Name 3 common variables to consider when scanning a network
whether networks are wired or wireless
whether systems and network devices are physical or virtual
whether systems are on-prem or in the cloud
what must you consider before scanning a cloud service?
contracts or agreements that would prohibit you from performing scans
Documenting what you know about the networks and systems you’re scanning is important because?
you can then consider how they could impact the data you gather and the techniques you use.
what is often the first step in active reconnaissance?
port scanning
what reconnaissance tool can assist security audits and the testing the security of devices?
port scanners
list 3 ways to carry out service identification
1) grabbing the banner page
2) view the connection information provided by the service
3) comparing the responses to signatures of known services
which free, open source tool is the most commonly used command-line port scanner?
nmap
do you always need an OS identification scan to identify the OS in nmap?
No. You can determine from the ports listed on what OS they are on
What is the most popular nmap scan method and why?
TCP SYN method. It verifies the services response. It’s quick and unobtrusive
you are doing active reconnaissance and want to find out firewall rules, what type of scan could you use?
ACK scan using nmap
Which utility sends out network device logs to a central Network Management Server?
syslog utility
you want to find information about what systems interact with a network device and administrative and user account details. Where would you check?
in the network device configuration files
you want to see traffic flow and volume on a Cisco network, what two elements can achieve this?
Netflow protocol and a netflow analyzer
if you can see the firewall logs, but not the configuration file, can you still determine what the rules are?
Yes the rules can be reverse engineered