D1: Management Protocols Flashcards

1
Q

What port does Telnet work on?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What port does SSH work on?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What port does SNMP work on?

A

161 and 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port does TFTP work on?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does NTP work on?

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Telnet?

A

Allows command-line access to servers and embedded devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What weakness does Telnet have?

A

Default credentials can provide shell access to the server.

Possible to intercept a user logging into the server running telnet.

Versions of telnet services may be exposed if they have not already been picked up by nmap scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SSH?

A

Creates encrypted communication channel to the server which allows you to pass commands to host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weakness of SSH

A

Default credentials

Password authenticated enabled

Old versions of SSH

Weak SSH keys

Key Exchange with unsafe groups and elliptic curves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer does Telnet work on?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer does SSH work on?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer does SSH work on?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SNMP do?

A

Service is run on managed switches, routers and servers for monitoring – called SNMP agents – can gather information about a piece of hardware, organize it into predefined entries and respond to queries using the SNMP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the commands for the SNMP protocol?

A

GetRequest, GetNextRequest, GetBulkRequest, SetRequest, InformRequest, and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What weaknesses does Version 1 SNMP have?

A

Community strings are used. Read-only and read-writ SNMP strings meaning info can be queried if community string is known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What weaknesses does Version 2 SNMP have?

A

Hard to set up and not widely used.

17
Q

What weaknesses does Version 2c SNMP have?

A

Revised version that includes enhanced protocol packet types, transport mappings and MIB structure elements. Security was rolled back to using community strings same as Version 1.

18
Q

What weaknesses does Version 3 SNMP have?

A

Supports the remote configuration of SNMP entities. Adds encryption and authentication, can be used together or separately, making it most secure version however exploits still available such as user enumeration.

19
Q

Other generic weaknesses for SNMP?

A

Default community strings set

User enumeration

Brute-force of community strings and user passwords

Useful information leakage

20
Q

What tools can be used for SNMP?

A

snmpwalk

snmpcheck

21
Q
A