Ethical Hacking 3 Flashcards
Which UNIX tool can be used to determine the subnets in use on a network?
ICMPquery
What can the ike-scan utility be used to test?
The ike-scan utility utilizes the IKE protocol for testing and fingerprinting VPN servers using IPSec
You have just deployed a new set of firewall parameters and wish to test firewall rules using an application that will report on what information returns in response to the test. The ideal utility should be capable of remote OS fingerprinting and the ability to discover open ports behind firewalls. What utility should you use?
HPing2
What is NOT a typical purpose for which a proxy server is used?
As a router
What is the primary purpose of scanning from the perspective of an attacker?
The purpose is to gather information about specific IPs, target operating systems and system architecture, and services running.
Regarding the features of the SSL proxy tool, what statement is accurate?
It is built on top of the OpenSSL library.
Which protocol can be used for banner grabbing?
Telnet
Anonymizers have several limitations; what statement regarding their use is not accurate?
Secure protocols such as HTTPS can be anonymized, but only thought the reduction of the security encryption provides.
What operating system family uses a time dependent model where the initial sequence number of a TCP connections is incremented by a fixed amount for each time period?
Windows
What type of scanning involves attempting to connect to a target system using TCP or UDP to determine if the services are listening?
port
Which scanning method is a basic network scanning technique to determine which range of IP addresses map to live hosts (computers)?
ping sweep
Which type of scan is intended to check the services running on a target computer by sending a sequence of messages in an attempt to break in?
port scanning
A client has come to you for help in securing their network against scanning attempts. Specifically, the client wants to protect against OS fingerprinting by tools like Nmap. What should you recommend?
Deploy a network intrusion detection system such as snort to detect OS fingerprinting attempts.
The TCP three-way handshake is a common networking process that is manipulated to accomplish which step of the scanning methodology?
Check for open ports
During which step of the scanning methodology would you use a ping sweep?
Check for live systems