Enumeration Flashcards

1
Q

Enumeration extracted information such as:

A
  • network shares
  • network resources
  • routing tables
  • audit and service settings
  • SNMP & DNS details
  • Machine names
  • Users & groups ( and user last log in)
  • Application and banners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumeration techniques are conducted in what type of environment?

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is enumeration?

A

The attacker creates an active connection to a vulnerable system and performs direct queries to gain info about the target

Attacker then uses the info to 1- identify system attack points and 2- perform password attacks, to gain unauthorized acess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

list some services and ports to enumerate

A
TCP port 25: SMTP
TCP port 53: DNS transfer zone 
TCP port 21: FTP
TCP port 23: telenet 
TCP 135 : used by email client to connect to email services (RPC) Remote Procedure Call 
TCP 138: NetBIOS datagram service 
TCP 137: NetBIOS name service 
TCP 139: NetBIOS session service
TCP/UDP 445 SMB (service message block )
UDP 161: SNMP network mangment protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SMB protocol?

A

SIMPLE MESSAGE BLOCK is a microsoft application layer protocol for file and print sharing functions for LAN manger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is NBSS (NetBIOS session service)?

A

is a method to connect two computers for transmitting large messages ( located in session layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is NetBIOS?

A

is a program that allows applications on a different computers to communicate within a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explian what is NetBIOS name and what it is consists of?

A

is a unique 16 ASCII character string used to identify the network devices
first 15 char: device name
the 16th char: service type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attackers use NetBIOS ro obtain what info?

A
  • list of computers that belong to a domain
  • list of shares on the individual hosts (in the network)
  • polices and passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is RPC? and what port?

A

Remote procedure call an interprocess communication mechanism allows a program running on one host to run code on a remote host. uses port 135 tcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What commands can be used for NetBIOS emmunartion?. mention for win and linux

A

Windows:
nbtstat -a [ip]
Linux:
nbtscan [ip]

or
nmblookup -A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what happens when you use firweall rules for port 137?

A

when you use nbtstat or nbtscan it will show that the hst is not uo ( it has been blocked by the firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a NULL session attack?

A

uses vulnerblity in SMB for creating connection, by default they areenabled in windows 2000 and windows NT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why is a null session attack possible?

A

because it uses SMB that has trust for any kind of relationship between devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what command to establish null session? in win and Linux

A

windows: net

net use \[ip]\IPC$ “ “ /u:” “

Linux: smbclient

smbclient -L [ip]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what command used to show ip adress and shares on remote system & to list

A

net view \[ip]

17
Q

what command used to eumnertate SMB shares on both win & linux ?

A

enum4linux -a

use -a option to get all oinfo

18
Q

what is the command used for DNS enumeration? (not nmap)

A

host -t ns [ip]
for name server records
host -t mx
for mail exchange brecords (email servers)
host -t a
a records that tranlate human to ip in IPv4
host -t aaa
same as a records but for IPv6
host -t soa
start of authority that contains 1- primary DNS name 2- serial number and if the serial no for primery is higher than secondary a zone tranfer will be instiated

19
Q

what is the nmap command used for DNS enumartion

A

nmap T4 -p 53 –script dns-brute [target]

20
Q

In SNMP, the default community string for read-only is____ and the default community string for read-write is ____

A

public,private

21
Q

what command is used in SNMP to query network device for tree of information? and what command query info in human friendly format?

A

snmpwalk, snmp-check

22
Q

what command to uses to manilpate snmp info?

A

snmpset

23
Q

what are the two types of community strings?

A

1- read only
allow to query network devices and read information. no modfication allowed
2-read write
changes to device are allowed

24
Q

a virtual database contains a formal description of all network objects that can be managed using SNMP is caleed___

A

Management Information base (MIB), it is hierarchal and each managed object is addressed through object identifiers (OID)

25
Q

what is LDAP?

A

Lightweight Directory Acess Protocol is for acessing and maintaing dirubted directory information sercvies in a heirarlical and logial structure.

LDAP provides a central place to store usernames and passord so apps and services uses it to identify users

26
Q

What command is used for LDAP?

A
enum4linux -U -O 
-U to get userlist 
-M to get machine list 
-s to get sharelist 
-G to get group and member list 
-P passord policy info
see slide 61 for more