Ethical Hacking 2 Flashcards
When using Nslookup, you must type ____ if you wish to query for a host name outside the domain.
The FQDN
Which DNS tool uses a technique that scans and browses a list of generated names in order to spot domains that capitalize on inadvertent URL misspellings?
MSR Strider URL Tracer
What type of information gathering is carried out by obtaining details that are freely available on the Internet and through various other techniques, without directly coming into contact with the organization’s internal servers?
passive
You are scanning a domain and need to see third party domains that it serves content from, and you need to be able to detect whether the site is being redirected. What tool should you use?
MSR Strider
What type of information are you likely to find in a zone?
resource records
Which WHOIS tool can be used to see when someone has connected to his or her computer?
CallerIP
What IP address blocks are valid for use as private IP address networks?
10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12
How does the traceroute utility determine the path of data through a network?
Traceroute sends a pakcet with a TTL value of 1 initially, causing the packet to be returned. It then send sout additional packets, increasing the TTL value by 1 to account for each hop in the path.
You are using the BiDiBLAH toolset and are trying to determine DNS information for a doman that does not allow DNS zone transfers. What utility should you use?
jarf-dnsbrute
When identifying security postures for a network, what are can an attacker investigate to find information about authentication mechanisms?
Remote access
What file stored at the root of a website and is publicly accessible might contain a list of directories filled with sensitive information that is not to be indexed by search engines?
robots.txt
What Regional Internet Registry (RIR) might contain whois database information about an IP address sourced from Russia?
APNIC
What intelligence gathering stance involves the process of accumulating information from resources such as the Internet that can later be analyzed as business intellignce?
Competitive information gathering
What query protocol can be used to identify IP addresses, domain names, server type, domain name registrar, and name servers for a domain?
WHOIS
Which tool used to locat the network range can be used to reveal relationships between people, organizations, and ideas in the network?
TouchGraph