Chapter 3, reconnaissance and intelligence gathering Flashcards

Domain 1.0 Threat and vulnerability management 1.4 given a scenario, analyze the output from common vulnerability assessment tools Domain 3.0 Security Operations and Monitoring 3.1 given a scenario, analyze data as part of monitoring activities

1
Q

what is the first step when gathering organizational intelligence?

A

identifying the organization’s technical footprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host enumeration creates a map of an organizations networks, systems and other infrastructure. Active reconnaissance uses ___ ____ ____ to help achieve this

A

host scanning tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Testers can gain an understanding of the network topology based on the ? and other network responses

A

time to live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what can stop nmap getting results from the network? How else might you get the information?

A

firewalls can stop traffic

you can try passive footprinting instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When laying out the systems discovered in a scan, it is important to lay them out according to what and what?

A

the network addresses and TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 common variables to consider when scanning a network

A

whether networks are wired or wireless
whether systems and network devices are physical or virtual
whether systems are on-prem or in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what must you consider before scanning a cloud service?

A

contracts or agreements that would prohibit you from performing scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Documenting what you know about the networks and systems you’re scanning is important because?

A

you can then consider how they could impact the data you gather and the techniques you use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is often the first step in active reconnaissance?

A

port scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what reconnaissance tool can assist security audits and the testing the security of devices?

A

port scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

list 3 ways to carry out service identification

A

1) grabbing the banner page
2) view the connection information provided by the service
3) comparing the responses to signatures of known services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which free, open source tool is the most commonly used command-line port scanner?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

do you always need an OS identification scan to identify the OS in nmap?

A

No. You can determine from the ports listed on what OS they are on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most popular nmap scan method and why?

A

TCP SYN method. It verifies the services response. It’s quick and unobtrusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

you are doing active reconnaissance and want to find out firewall rules, what type of scan could you use?

A

ACK scan using nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which utility sends out network device logs to a central Network Management Server?

A

syslog utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

you want to find information about what systems interact with a network device and administrative and user account details. Where would you check?

A

in the network device configuration files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

you want to see traffic flow and volume on a Cisco network, what two elements can achieve this?

A

Netflow protocol and a netflow analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

if you can see the firewall logs, but not the configuration file, can you still determine what the rules are?

A

Yes the rules can be reverse engineered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is DNS data one of the first places to go for passive footprinting?

A

it’s publically available and you can easily connect other information to an organization using the whois lookup

21
Q

How might you get information about an organizations external network connectivity?

A

using BGP looking glasses

22
Q

Domain registrars do what? Who accredits them and who do they work with?

A

They manage domain names and provide the interface between customers and the domain registries
They are accredited by domain registries and work with them to provide registration services.

23
Q

Who handles domain renewals and transfers of domains, domain registries or domain registrars?

A

domain registrars

24
Q

what is the DNS root zone and who manages it

A

The root zone handles the assignments of gTLDs and ccTLDs. It’s managed by the IANA

25
Q

Which organizations have authority over DNS Root Zones? How many are there? What common lookup service do they provide?

A

Regional Internet Registries.
there are 5
They provide the WHOIS service to lookup the identity of the assigned users IP space

26
Q

What clues can DNS entries provide? What command do you use?

A

hostnames, which can provide clues as to the service or applications running on them.
nslookup

27
Q

How would you discover further DNS service following a whois lookup? Then what

A

Active port scanning for UDP/TCP 53
passively looking at network traffic logs
checking if zone transfers are possible

28
Q

Describe DNS brute forcing

A

sending DNS queries for each IP that the organization uses.

29
Q

what activity can obtain the SOA record, the wait time between name changes, minimum TTL for the domain and primary name servers?

A

DNS zone transfers

30
Q

which Python tool is a mixture of passive and active gathering and works by hijacking responses to broadcast events?

A

Responder

31
Q

What aggregation tool would you use to see relationships maps between people and their ties to other resources?

A

Maltego

32
Q

What analysis tool allows you to search internet connected devices and their vulnerabilities?

A

Shodan

33
Q

what aspects of passive footprinting isn’t not possible to get from an external network only?

A

Getting DHCP/firewall/other network device logs and configurations.
Getting system logs.

34
Q

Name one method to prevent your electronic documents from revealing useful information?

A

Using metadata scrubbing utilities

35
Q

What do companies have to be aware of when it comes to websites and information gathering?

A

caching of previous website versions that may contain data they no longer want public

36
Q

Which two popular services allow you to view previous versions of a company’s website?

A

Internet Archive and the Time Travel Service

37
Q

Social media profiling may be paired with what for a more in-depth analysis?

A

Information to databases that provide paid access to information gathered about individuals.

38
Q

Which 3 tools can help with conducting social engineering attacks?

A

1) The Social Engineering Toolkit
2) Creepy, geolocation tool
3) Metasploit, for phishing et al

39
Q

What’s the first step in protecting against reconnaissance? Where on the network do you apply it for the most benefit?

A

Data capture
monitoring at the connection points between zones
monitoring where data sensitivity / privileged zones meet

40
Q

Which 4 types security devices would you use to collect data to detect reconnaissance? What tools can they provide?

A

IDS/IPS,NIDS,HIDS

They provide packet analysis, protocol analysis and traffic and flow analysis capability.

41
Q

What’s the problem with reconnaissance detection and hosted services? What should you ensure the host has?

A

It’s hard to detect and you’re relying on what the host has in place to protect against it.
You should the ensure the host has regular external security audits

42
Q

List the 4 types of data analysis methods you could use after capturing data to detect reconnaissance?

A
Anomaly
Trend
signature Analysis
Heuristic or behavioral
manual
43
Q

Which analysis method do IDSs and IPSs use?

A

anomaly detection

44
Q

deploying _____ defense in-depth can limit ____ reconnaissance

A

network defense in-depth

active reconnaissance

45
Q

Complete the 3 statements on defenses against active reconnaissance
Limiting _______ exposure of services and knowing your _____ footprint
Using an ____ or similar to stop probes
Using _______ and ______ systems to notify you about events that the other two techniques might miss

A

limiting external exposure, knowing you external footprint

Using an IPS

Using monitoring and alerting systems

46
Q

preventing passive reconnaissance relies on you doing what?

A

controlling the information you release

47
Q

List anti-DNS harvesting techniques

A

blacklisting to prevent abuse of the service
using captcha to prevent bots
using 3rd party domain registration services that hide the actual owner of the domain
implementing rate limiting to reduce the rate of lookups
not publishing zone files if possible

48
Q

what pro-active measure can help you understand your footprint thus potential areas of exposure to prevent reconnaissance?

A

pen-testing