Enumeration Tools Flashcards

1
Q

Process to identify and scan network ranges and hosts belonging to the target and
map out an attack surface

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A connection is made from the attacker to a target and data is
transmitted

A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

No connection is made from the attacker to a target and data
collected can be analyzed
Network sniffers are considered a passive form of enumeration
Wireshark
Zeek or Bro
p0f

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tools that map out the layout of a network, typically in terms of IP address usage,
routing topology, and DNS namespace (subdomains and hostnames)

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tools that perform host system detection to map out open ports, OS type and
version, file shares, running services and applications, system uptime, and other
useful metadata

A

Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A versatile port scanner used for topology, host, service, and OS discovery and
enumeration
A nmap discovery scan is used to footprint the network

A

Nmap Security Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lists the IP addresses from the supplied target range(s) and performs a
reverse-DNS query to discover any host names associated with those
IPs

A

List Scan (-sL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Probes specific ports from the given list using a TCP SYN packet instead
of an ICMP packet to conduct the ping

A

TCP SYN ping (-PS <PortList>)</PortList>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Issues probes with significant delays to become stealthier and avoid
detection by an IDS or IPS

A

Sparse Scanning (–scan-delay <Time>)</Time>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Issues probes with using a timing pattern with n being the pattern to
utilize (0 is slowest and 5 is fastest)

A

Scan Timing (-Tn)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technique that splits the TCP header of each probe between multiple
IP datagrams to make it hard for an IDS or IPS to detect

A

Fragmentation (-f or –mtu)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After your footprinting is complete, it is time to begin fingerprinting hosts

A

Nmap Port Scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Conducts a half-open scan by sending a SYN packet to identify the port
state without sending an ACK packet afterwards

A

TCP SYN (-sS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Conducts a three-way handshake scan by sending a SYN packet to
identify the port state and then sending an ACK packet once the SYNACK is received

A

TCP Connect (-sT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Conducts a scan by sending a packet with the header bit set to zero

A

Null Scan (-sN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Conducts a scan by sending an unexpected FIN packet

A

FIN Scan (-sF)

16
Q

Conducts a scan by sending an unexpected FIN packet

A

FIN Scan (-sF)

17
Q

Conducts a scan by sending a packet with the FIN, PSH, and URG flags
set to one

A

Xmas Scan (-sX)

18
Q

Conducts a scan by sending a UDP packet to the target and waiting for a
response or timeout

A

UDP Scan (-sU)

19
Q

Conducts a scan by targeting the specified ports instead of the default
of the 1,000 most commonly used ports

A

Port Range (-p)

20
Q

An application on the host is accepting connections

A

Open

21
Q

The port responds to probes by sending a reset [RST] packet, but no application is
available to accept connections

A

Closed

22
Q

Nmap cannot probe the port, usually due to a firewall blocking the scans on the
network or host

A

Filtered

23
Q

Nmap can probe the port but cannot determine if it is open or closed

A

Unfiltered

24
Q

Nmap cannot determine if the port is open or filtered when conducting
a UDP or IP protocol scan

A

Open|Filtered

25
Q

Nmap cannot determine if the port is closed or filtered when
conducting a TCP Idle scan

A

Closed|Filtered

26
Q

Scheme for identifying hardware devices, operating systems, and
applications developed by MITRE

A

Common Platform Enumeration

27
Q

Scripts are written in the Lua scripting language that can be used to
carry out detailed probes

A

Nmap Scripting Engine (NSE)

28
Q

An open-source spoofing tool that provides a pen tester with the ability to craft
network packets to exploit vulnerable firewalls and IDS/IPS

A

hping

29
Q

Send a SYN or ACK packet to conduct detection and testing

A

Host/port Detection and Firewall Testing

30
Q

Used to determine the system’s uptime

A

Timestamping

31
Q

Use arbitrary packet formats, such as probing DNS ports using TCP or UDP, to
perform traces when ICMP is blocked on a given network

A

Traceroute

32
Q

Attempts to evade detection by IDS/IPS and firewalls by sending fragmented
packets across the network for later reassembly

A

Fragmentation

33
Q

A command-line tool used to poison responses to NetBIOS, LLMNR, and MDNS
name resolution requests in an attempt to perform a man-in-the-middle attack

A

Responder

34
Q

Tools used to detect the presence of wireless networks, identify the security type
and configuration, and try to exploit any weaknesses in the security to gain
unauthorized access to the network

A

Wireless Assessment Tools

35
Q

A suite of utilities designed for wireless network security testing

A

Aircrack-ng Suite

36
Q

A command-line tool used to perform brute force attacks against WPS-enabled
access points

A

Reaver

37
Q

A command-line tool used to perform brute force and dictionary attacks against password
hashes

A

Hashcat