Chapter 4 Footprinting & Reconnaissance Flashcards

1
Q

PHASE 1 of the ethical hacking process!!

A

Footprinting - PASSIVELY gaining info about target

i.e. want just enough data to plan next phase of scanning

includes IP address ranges, Namespaces, Employee info, phone #s, facility info, job info, OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phase 2

A

Scanning - ACTIVELY gaining info; footprinting helps identify targets but not all may be active, which is where scanning takes place

includes locating active hosts to target in later phase, pings, ping sweeps, port scans, tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phase 3

A

Enumeration - systematic probing of target w/ goal of obtaining user lists, routing tables, & protocols from the system; shifting from outside to inside to gather data

includes shares, users, groups, applications, protocols, banners, usernames, group info, passwords, device info, NW layout, services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phase 4

A

System Hacking - methodical approach including cracking passwords, escalating privileges, executing apps, hiding files, covering tracks, concealing evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Footprinting, or reconnaissance definition

A

method of observing & collecting info about potential target w/ the intention of finding a way to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maltego

A

app that illustrates relationship between people, gruops, companies, etc (illustrates the dangers of social networking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Financial Services Info Types

A

Company officers, financials, sites, known risks, competitive analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Job Site Info Type

A

Hardware/software details, org structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WhoReadMe.com

A

allows you to track emails & provides info on OS, browster type, location, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Competitive Analysis

A

establishing what makes your product or service unique; looking at what competitors are doing to see how your target is moving

reports provide info such as project data, financial status, etc

Tools such as EDGAR (reports), LexisNexis (news), BusinessWire (status), CNBC (future plans)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Google Hacking “cache:”

A

shows page in google cache (not the actual website)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whois

A

find domain name, IP info, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Archive.org

A

(aka The Wayback Machine) allows you to find archived copies of websites form which you can extract information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Netcraft

A

suite of tools used to obtain web server version, IP address, subnet data, OS info, subdomain info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Link Extractor

A

this tool locates & extracts the internal and external URLs for a given location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tracert

A

follow the path of traffic from one point to another, find relative performance and latency between hops; find server names, etc

17
Q

Google Hacking

link:

A

sites that link to the one in the search term

18
Q

Google Hacking

info:

A

get details about a site

19
Q

Google Hacking

site:

A

Returns only result from specified site

20
Q

Google Hacking

allintitle:

A

Returns websites w/ specified words in their title

21
Q

Google Hacking

allinurl:

A

Returns websites w/ specified words in their url

22
Q

Google Hacking

filetype

A

Returns only results of that filetype (i.e. filetype:pdf)

23
Q

Google Hacking database

A

www.exploit-db.com/google-dorks/

24
Q

Active Info gathering

A

engaging target for info (i.e. social engineering)

25
Q

Pseudonymous Footprinting

A

gathering info from online sources posted by someone from the target but under a diff name