Enumeration Tools Flashcards

1
Q

Process to identify and scan network ranges and hosts belonging to the target and
map out an attack surface

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A connection is made from the attacker to a target and data is
transmitted

A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

No connection is made from the attacker to a target and data
collected can be analyzed
Network sniffers are considered a passive form of enumeration
Wireshark
Zeek or Bro
p0f

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tools that map out the layout of a network, typically in terms of IP address usage,
routing topology, and DNS namespace (subdomains and hostnames)

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tools that perform host system detection to map out open ports, OS type and
version, file shares, running services and applications, system uptime, and other
useful metadata

A

Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A versatile port scanner used for topology, host, service, and OS discovery and
enumeration
A nmap discovery scan is used to footprint the network

A

Nmap Security Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lists the IP addresses from the supplied target range(s) and performs a
reverse-DNS query to discover any host names associated with those
IPs

A

List Scan (-sL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Probes specific ports from the given list using a TCP SYN packet instead
of an ICMP packet to conduct the ping

A

TCP SYN ping (-PS <PortList>)</PortList>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Issues probes with significant delays to become stealthier and avoid
detection by an IDS or IPS

A

Sparse Scanning (–scan-delay <Time>)</Time>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Issues probes with using a timing pattern with n being the pattern to
utilize (0 is slowest and 5 is fastest)

A

Scan Timing (-Tn)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technique that splits the TCP header of each probe between multiple
IP datagrams to make it hard for an IDS or IPS to detect

A

Fragmentation (-f or –mtu)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After your footprinting is complete, it is time to begin fingerprinting hosts

A

Nmap Port Scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Conducts a half-open scan by sending a SYN packet to identify the port
state without sending an ACK packet afterwards

A

TCP SYN (-sS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Conducts a three-way handshake scan by sending a SYN packet to
identify the port state and then sending an ACK packet once the SYNACK is received

A

TCP Connect (-sT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Conducts a scan by sending a packet with the header bit set to zero

A

Null Scan (-sN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Conducts a scan by sending an unexpected FIN packet

A

FIN Scan (-sF)

16
Q

Conducts a scan by sending an unexpected FIN packet

A

FIN Scan (-sF)

17
Q

Conducts a scan by sending a packet with the FIN, PSH, and URG flags
set to one

A

Xmas Scan (-sX)

18
Q

Conducts a scan by sending a UDP packet to the target and waiting for a
response or timeout

A

UDP Scan (-sU)

19
Q

Conducts a scan by targeting the specified ports instead of the default
of the 1,000 most commonly used ports

A

Port Range (-p)

20
Q

An application on the host is accepting connections

21
Q

The port responds to probes by sending a reset [RST] packet, but no application is
available to accept connections

22
Q

Nmap cannot probe the port, usually due to a firewall blocking the scans on the
network or host

23
Q

Nmap can probe the port but cannot determine if it is open or closed

A

Unfiltered

24
Nmap cannot determine if the port is open or filtered when conducting a UDP or IP protocol scan
Open|Filtered
25
Nmap cannot determine if the port is closed or filtered when conducting a TCP Idle scan
Closed|Filtered
26
Scheme for identifying hardware devices, operating systems, and applications developed by MITRE
Common Platform Enumeration
27
Scripts are written in the Lua scripting language that can be used to carry out detailed probes
Nmap Scripting Engine (NSE)
28
An open-source spoofing tool that provides a pen tester with the ability to craft network packets to exploit vulnerable firewalls and IDS/IPS
hping
29
Send a SYN or ACK packet to conduct detection and testing
Host/port Detection and Firewall Testing
30
Used to determine the system’s uptime
Timestamping
31
Use arbitrary packet formats, such as probing DNS ports using TCP or UDP, to perform traces when ICMP is blocked on a given network
Traceroute
32
Attempts to evade detection by IDS/IPS and firewalls by sending fragmented packets across the network for later reassembly
Fragmentation
33
A command-line tool used to poison responses to NetBIOS, LLMNR, and MDNS name resolution requests in an attempt to perform a man-in-the-middle attack
Responder
34
Tools used to detect the presence of wireless networks, identify the security type and configuration, and try to exploit any weaknesses in the security to gain unauthorized access to the network
Wireless Assessment Tools
35
A suite of utilities designed for wireless network security testing
Aircrack-ng Suite
36
A command-line tool used to perform brute force attacks against WPS-enabled access points
Reaver
37
A command-line tool used to perform brute force and dictionary attacks against password hashes
Hashcat