Chapter 3 - Scanning and Enumeration (Enumeration) Flashcards

1
Q

Define enumeration

A

listing the items we find within a specific target

In enumeration we move to a more active state and are finding things like open shares and user account information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Windows security terms

Security Identifier (SID)

Resource Identifier (RID)

A

SID - identifies user, group, computer accounts and follows a specific format

RID - a portion of the SID. Starts at 500 for the admin account. Guest is 501. All users created for the system start at 1000 and increment

Linux uses UID and GUID in a similar way. viewable in the /etc/passwd file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SID Format

A
S
revision number
authority value
domain or computer indicator
RID

This SID shows an admin account because the RID is 500:

S-1-5-21-3874928736-367528774-1298337465-500

If the RID was -1014 we know it’s for the 14th user account created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Location of Windows password database

A

c:\windows\system 32\config\SAM

SAM database holds all local passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Linux enumeration commands

finger
rpcinfo
rpcclient
showmount

A

finger - provides info on user and host machine
rpcinfo and rpcclient - provide info on RPC environment
showmount - displays all shared directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Banner Grabbing

A

sending unsolicited request to an open port to see what if any default message (banner) is returned. This can indicate a potential vulnerability

Telnet is a common tool for this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECC defines 2 types of banner grabbing

active
passive

A

Active - sending specially crafted packets to systems and comparing responses to determine the OS

Passive - reading error messages, sniffing network traffic or looking at page extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NetBIOS Enumeration commands

nbtstat
nbtstat -n
nbtstat -A
nbtstat -c

A

nbtstat
shows list of switches to use for command

nbtstat -n
shows your local netbios table

nbtstat -A ipaddress
shows a remote systems netbios table

nbtstat -c
shows the cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NetBIOS Codes, Type, Meaning

1B
1C
1D
00
03
20
A

<1B>UNIQUE
Domain master browser

<1C>UNIQUE
Domain controller

<1D>GROUP
Master browser for the subnet

<00>UNIQUE
Hostname

<00>GROUP
Domain name

<03> UNIQUE
Service running on the system

<20> UNIQUE
Server service running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMP Enumeration Terms

Manager
Agents
MIB
OID

A

Manager makes requests of SNMP agents that call for specific information about a device

Agents look at the MIB on the device and respond to requests

MIB (Mgmt Info Base) holds variety of info about the device

OIDs are Object Identifiers that are numeric IDs in the MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNMP Enumeration Terms

Scalar managed object
Tabular managed object
Community string

A

Scalar - single object

Tabular - multiple related objects that can be grouped together in MIB tables

community string is a form of password. Can be read-only or read-write (SNMP GET or SNMP SET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP Community String security details

A

SNMP v1 sends string in clear text

SNMP v3 encrypts them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP Enumeration Tools

A

Engineer’s toolset (solar winds)

SNMP Scanner (secure-bytes.com)

OpUtils 5 (managengine.com)

SNScan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP Enumeration Terms

Port and Protocol
DSA
BER

A

Lightweight Directory Access Protocol is designed to be queried

Uses TCP 389

client connects to the Directory System Agent (DSA)

DSA return an answer using Basic Encryption Rules (BER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTP Enumeration

Port and Protocol

A

UDP 123

Querying NTP server can provide info about list of systems connected, possibly IP addresses of internal systems (if an internal NTP server)

Can use Nmap and Wireshark to query NTP Servers. Also Atomsync and NTP Server Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP enumeration commands

VRFY
EXPN
RCPT TO

A

VRFY - validates user

EXPN - provides actual delivery addresses of lists and aliases

RCPT TO - defines recipients