Chapter 6 Enumeration Flashcards
1) Extracting info from Email IDs
used to obtain username & domain name info
e-mail address contains two parts, the first before @ is username, and after @ is the domain
3) Using Brute-force attacks on Directory Services
a directory service is a DB that contains info used to administer the NW; many directories are vulnerable to input verification deficiencies that may be exploited in discovering & compromising user accounts
4) Exploiting SNMP
The Simple NW Mgmt Protocol can be exploited by an attacker who can guess the strings & use them to extract usernames
5) Working with DNS Zone Transfers
Zone transfer in DNS is used to synchronize server info; contains info that could map the NW
info could fall into wrong hands
6) Capturing Users Groups
extract user accounts from specified groups, storing the results, & determining whether the session accounts are in the group
Windows User Contexts (4)
Users are most responsible for controlling access to the system
1) Local Service - user account w/ high than normal access to the local system but only limited access to the NW
2) NW service - A user account w/ normal access to the NW but only limited access to the local system
3) System - A super-user style account that has nearly unlimited access to the local system
4) Current User - The currently logged-in user, who can run applications & tasks but is still subject to restrictions that other users are not subject to. The restrictions on this account hold true even if the user account being used is an Admin account
Security Identifiers (SID)
Each user account in windows has an SID (S-1-3-43-4993949…) Even though you use a username to access the system, Windows identifies each user, group, or object by the SID. Windows uses the SID to match passwords and check permissions
1) TCP 53
Used for DNS Zone Transfers; DNS system keeps servers up to date w/ latest Zone data
2) TCP 135
communications between client-server apps, such as Microsoft Outlook to communicate w/ Microsoft Exchange
3) TCP 137
associated w/ NetBIOS Name Service (NBNS) is designed to provide name resolution services involving the NetBIOS protocol;
The service allows NetBIOS to associate names & IP addresses of individuals systems & services; This service is a natural & easy target for many attackers
4) TCP 139
NetBIOS Session Service, aka SMB over NetBIOS; management of connections between NetBIOS-enabled clients & apps; service is used by NetBIOS to establish connections & tear them down when they are no longer needed
5) TCP 445
SMB over TCP
6) UDP 161 and 162
SNMP is a protocol used to manage & monitor NW devices & hosts; The protocol is designed to facilitate messsaging, monitoring, auditing, & other capabilities;
Listening takes place on 161 & traps are received on 162
7) TCP/UDP 389
LDAP (Lightweight Directory Access Protocol) is used by many apps; Two of the most common are Active Directory & Exchange;
Used to exchange info beetween two parties; If this port is open, that means one of these or a similar product is present
8) TCP/UDP 3368
Global Catalog Service associated w/ AD;
service used to locate information within AD