Domain 2: Information Gathering and Vulnerability Scanning Flashcards

Information Gathering and Vulnerability Scanning

1
Q

What is Reconnaissance?

A

Learning abiut an organization in a systematic attmept to locate, gather, identify and record information about the target

aka Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is passive reconaissance?

A

Investigating the target without activly engaging with the target organizations systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Open-Source Intelligence?

A

The collection and analysis of data gathered from publicly available sources to produce actionable inteliligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should you do with reconaissance findings?

A

Gather and catalog all findings for others to review and use

Useful for when workign as a team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of Open Source Inteligence

A
  • Blogs
  • Publications\
  • Adverts
  • Job Listings
  • Metadata
  • Website Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Good key details to understand abouut the target organization?

A
  • Roles of different employees
  • Different teams and departments
  • Contact Information
  • Technical Aptitud\e and Security Training
  • Employee and Managerial Mindset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A linux-based tool that can search the metadata associated with public documents located on a targets website

Security Tool

Obj 2.1

A

Metagoofil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Metadata?

A

The data about the data in the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to find metadata and hidden information in collected documents from an organization.

Secuirty Tool

Obj 2.1

A

Fingerprint Organizations with Collected Archives (FOCA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A program for gathering emails, subdomains, hosts, employee names, email addresses, PGP Key Entires, open ports ans service banner from servers.

Secuirty Tool

Obj 2.1

A

The Harvester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses a system of modules to add additional features and functions for your use

Security Tool

Obj 2.1

A

Recon-NG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A website search engine used for finding hosts and networks across the Internet with data abouit their configurations

Secuirty Tool

Obj 2.1

A

Censys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A piece of commercial software used for conducting open-source inteligence that visually helps connect those relationships

Security Tool

Obj 2.1

A

Maltego

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A website search engine for web cameras, routers, servers and other devices that are considered part of the internet of things

Secuirty Tool

Obj 2.1

A

Shodan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the system that helps network clients find a website using human-readable hostnames instead of numeric IP addresses?

Obj 2.1

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Links a hostname to an IPv4 address

DNS Record

Obj 2.1

A

Address (A) Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Links a hostname to a IPv6 address

DNS Record

Obj 2.1

A

AAAA Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Points a domain to another domain or subdomain

DNS Record

Obj 2.1

A

Canonical Name (CNAME) Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Directs mail to a mail server

DNS Record

Obj 2.1

A

Mail Exchange (MX) Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Stores important information about the domain or zone

DNS Record

Obj 2.1

A

Start of Authority (SOA) Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Correlates an IP Address with a Domain Name

DNS Record

Obj 2.1

A

Pointer (PTR) Record

22
Q

Adds text into the DNS Record

DNS Record

Obj 2.1

A

Text (TXT) Record

23
Q

Specifies a host and port for a specific service

DNS Record

Obj 2.1

A

Service (SVR) Record

24
Q

Indicates which DNS nameserver has the authority

DNS Record

Obj 2.1

A

Nameserver (NS) Record

25
Which DNS records should a penetration tester focus on durign the recon phase?
MX, TXT and SRV to check for email and third-party SAAS solutions.
26
What is a cross-platform tool used to query the DNS to provide mapping between domain names and IP addresses or other DNS Records? | DNS Tool ## Footnote Obj 2.1
Name Server Lookup (NSLookup)
27
WHat is a command-line tool on Linux which is also a website that is a query and response protocol for Internet resources? | DNS Tool ## Footnote Obj 2.1
Whois
28
What websites allow developers to work together in an agile way to create software very quickly? ## Footnote OBJ 2.1
Public Source Code Repositories ## Footnote Gitlab etc
29
What type of files can be mistakenly classified as public for anyone to find? ## Footnote OBJ 2.1
Private Files
30
What have developers been known to put in public source code repositories? ## Footnote OBJ 2.1
Hard coded credentials & API Keys
31
Where can deleted website data still be know to exist on the internet? ## Footnote OBJ 2.1
Website Archives and Website Caches
32
What open source intelligence techniques use Google Search operators to locate vulnerable web servers and applications?
Google Hacking
33
Which grammar do you use to specify an exact phase to make a search more precise?
Quotes
34
Which Search Engine command uses a minus symbol tin front of a word or quoted phrase to exclude results?
NOT
35
Which logical operators require both search terms?
AND / OR
36
What are different keywords that can be used to select the search such as site, filetype, related, allintitle, allinurl and allinanchor?
Scope
37
What modifiers can be added to the results page to affect the results, such as &pws=0, &filter=0 etc
URL Modifier
38
What activity is performed to identify whether a link is already flagged on an existing reputation list or has a malicious script encoded in it?
URL Analysis
39
What is a set of request methods to indicate the desired action to be performed for a given resource?
HTTP Method
40
Which HTTP method is used to retrieve a resource?
GET
41
Which HTTP method is used to send data to the server for processing by the requested resource?
POST
42
Which HTTP method is used to create or replace the requested resource?
PUT
43
Which HTTP method is used to remove the requested resource?
DELETE
44
Which HTTP method retrieves the headers for a resource only and ignores the body?
HEAD
45
Which character delimits data that is submitted?
?
46
What are usually formatted as one or more name=value pair with & delimitating each pair?
&
47
What mechanism is used to encode 8-bit characters that have specific meaning in the context or URL's also known as URL encoding?
Percent Encoding
48
What checks the validity of certificates or potential vulnerabilities to exploit within the target servers?
Cryptographic Inspection
49
What defines the algorithm supported by the client and server when requesting to use encryption and hashing?
Cipher Suite
50
What can be used to trick the target organizations users?
Falsified digital certificates
51