CS0-003 Ports, Cisco, Cyber Kill Chain Flashcards
1
Q
Port 20, 21
A
FTP
2
Q
Port 22
A
SSH
3
Q
Port 23
A
Telnet
4
Q
Port 25
A
SMTP
5
Q
Port 53
A
DNS
6
Q
Port 80
A
HTTP
7
Q
Port 110
A
Post Office Protocol version 3 (POP3)
8
Q
Port 123
A
Network Time Protocol (NTP)
9
Q
Port 135
A
Windows Sharing
10
Q
Port 137
A
Windows Sharing
11
Q
Port 138
A
Windows Sharing
12
Q
Port 139
A
Windows Sharing
13
Q
Port 445
A
Windows Sharing
14
Q
Port 143
A
Internet Message Access Protocol (IMAP)
15
Q
Port 161
A
Simple Network Management Protocol (SNMP)
16
Q
Port 162
A
Simple Network Management Protocol (SNMP)
17
Q
Port 443
A
HTTPS
18
Q
Port 636
A
Lightweight Directory Access Protocol Secure (LDAPS)
19
Q
Port 1433
A
SQL Server
20
Q
Port 1434
A
SQL Server
21
Q
Port 1521
A
Oracle
22
Q
Port 1720
A
H.323 (Voice over IP)
23
Q
Port 1723
A
Point-to-Point Tunneling Protocol (PPTP)
24
Q
Port 3389
A
Remote Desktop Protocol (RDP)
25
Port 9100
HP JetDirect Printing
26
CVSS 0
None
27
CVSS 0.1-3.9
Low
28
CVSS 4.0-6.9
Medium
29
CVSS 7.0-8.9
High
30
CVSS 9.0-10
Critical
31
Cisco 0
Emergency
32
Cisco 1
Alert
33
Cisco 2
Critical
34
Cisco 3
Error
35
Cisco 4
Warning
36
Cisco 5
Notification
37
Cisco 6
Informational
38
Cisco 7
Debug
39
Reconnaissance
Gather OSINT Information
40
Weaponization
Goal: Create a malicious payload (usually a combination of malware + exploit).
Example: The attacker creates a PDF that exploits a known vulnerability and embeds a Remote Access Trojan (RAT) inside.
41
Delivery
Goal: Transmit the payload to the target.
Example: The malicious PDF is emailed to an employee disguised as an invoice from a known vendor.
42
Exploitation
Goal: Trigger the malicious code on the target system.
Example: The employee opens the PDF, which silently executes code due to the vulnerability.
43
Installation
Goal: Install malware on the victim’s machine.
Example: The RAT (random access trojan) is installed on the system, giving the attacker persistent access.
44
Command and Control (C2)
Goal: Establish communication with the attacker’s server.
Example: The RAT (random access trojan) contacts the attacker's server to receive instructions like downloading more tools or stealing files.
45
Actions and Objectives
Goal: Complete the attack objective (data theft, destruction, surveillance, etc.).
Example: The attacker exfiltrates sensitive customer data or installs ransomware.