Domain 2: Info Gathering and Vulnerability Identification Flashcards
What is Domain 2 of the Pentest+?
This domain covers information gathering and vulnerability identification
What are the five main functions of Domain 2?
- Conduct information gathering
- Perform Vulnerability Scanning
- Analyzing Results of Vuln Scan
- Leveraging Information for Exploitation
- Weaknesses in specialized systems
What is information gathering also known as?
This is also know as Reconnaissance or foot printing
What are some techniques of foot printing?
These are all techniques of this:
- Internet or open-source research
- Social Engineering
- Dumpster Diving
- Email Harvesting
What kind of information are we looking for during reconnaissance?
During this step,we are looking for:
- Phone numbers
- Contact Names
- Email Addresses
- security-related information
- information systems used (windows, linux, apache, etc)
- jobs postings
- Resumes
What are some reconnaissance tools?
These are tools for this step in the pentesting process:
- nslookup
- traceroute
- ping
- whois
- Domain Dossier
- Email Dossier
- Social Networking (FB, Linkedin, etc)
- Discover.sh
- Maltego
What tools does centralops.net provide?
This website provides:
- Email Dossiers
- Domain Dossiers
- Owner of the domain name
- Technical Details
- Network Ranges for the domain
What is to be done after footprinting & reconnaissance?
Scanning and enumeration is done after this step.
What is scanning?
When we actively connect to a system and get a response. Identify open ports and services.
What are the types of scanning?
These are types of this:
- Hosts
- Systems
- Networks
- Computers
- Mobile Devices
- Applications
- Printers
What is enumeration?
Actively connecting to the systems to determine open shares, user accounts, software versions, and other detailed info.
What types of enumerations are there?
There are types:
- hosts
- Networks
- Domains
- Users/Groups
- Network Shares
- Web Pages
- Application
- Services
- Tokens
- Social Networks
What is fingerprinting?
This is identifying an operating system, server, service that is being used by a particular service or network.
What is Banner Grabbing?
This is manual enumeration and fingerprinting. Using program such as telnet or netcat to connect to a target host. Commonly used for FTP, SSH, Telnet, & HTTP
What is packet crafting also known as?
This is also known as packet manipulation
What is packet crafting?
This entails sending modified packet headers to gather information from a system or host
What is packet inspection?
This is manual enumeration performed by analyzing the captured packets to determine information
When using nmap/zenmap, where do you typically want to start?
With these tools you’ll typically want to start with the least intrusive scan.
What is one of the least intrusive scans you can perform?
This type of scan would be a ping scan.
When scanning a network w/ nmap/zenmap, how would you list out a network with a /24? How about /16?
- 168.52.0/24
192. 168.52.0/16
When scanning a network with nmap/zenmap, how would scan a list of addresses?
- 168.52.0-254
192. 168.52.0-224
What would be the nmap command to run a simple ping scan on a network?
nmap -sn [network address]
nmap -sn 192.168.52.0
What information will a ping scan provide?
This type of scan will provide information on what machines are up or down on a given network. Provides IP addresses and MAC addresses.
We have two machines with the following IP addresses:
- 168.52.100
- 168.52.101
What would be the nmap command to run a quick scan?
nmap -T4 -F 192.168.52.100-101
What does it mean to have ports filtered?
This means that a firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed.
With Nmap, what would be an intrusive scan?
With this tool this would be considered an intense scan.
We have two machines with the following IP addresses:
- 168.52.100
- 168.52.101
What would be the nmap command to run an intense scan?
nmap -T4 -A -v 192.168.52.100-101
What is cryptographic Inspection?
This determines the indentification of the type of encryption being used by machines/hosts/services/etc during information gathering.
What is certificate inspection?
Identify what type of encryption a web server is using. ie. SSL 2.0, TLS? Tools exist for this.
Eavesdropping is considered what?
This is considered a method of information gathering
How can you eavesdrop on a network?
You can do this by sniffing network traffic.
What does it mean to sniff network traffic?
Intercepting and logging network traffic that can be seen via the wired or wireless network interface.