Ethical hacking 4 Flashcards

1
Q

What statement regarding a null session is accurate?

A

A null session can’t be used for encrypted data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As part of securing a host from null sessions, you have been asked to block ports on the corporate firewall. What port is not a port used by NetBIOS?

A

TCP 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your client has asked you to deploy SNMP enumeration countermeasures for a Windows server running legacy software. Due to the nature of the software, the server must use an SNMPv1 agent. What is a valid method for carrying out the cleint’s request?

A

Configure IPSec policies to authenticate and encrypt SNMPv1 Traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which UNIX command lists user information including the username, terminal name, and login time?

A

Finger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Windows, what two tools can be used to query SAM and search for SID values for a given account, or find an account for a given SID, respectively?

A

sid2user

user2sid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocols uses management information bases to define the information that a managed system offers?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which null session enumeration technique exploits a hidden share that allows communication between two processes on the same system?

A

IPC$ Share Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is generally the first step taken by a hacker to compromise a system in which information about the system is obtained?

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following can be described as pseudo account that has no username or password, but can be used to access certain information on the network?

A

null user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have enumerated the administrator account of a remote machine and have all the information needed to escalate a guest account to the administrato’s group. What command should you use?

A

sid2user \remotemachine:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What utility in the PsTools suite can be used to start a remote command prompt session on a target Windows computer on the network?

A

PsExec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can an attacker change via the guest account in Windows to escalate to he administratos’ group?

A

RID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocols is used to access directory listings within Active Directory or other directory services?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command can be used to enumerate basic user information for UNIX network resources?

A

Finger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What purpose does the HOSTMIB.MIB included with the Windows resource kit serve?

A

It monitors and manages host resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The server administrator for a system you have targeted as part of an audit has told you that he has secured his system from enumeration by changing the “RestrictAnonymous” setting to “1”. What can you do to attempt enumeration anonymously?

A

You can use the GetAcct utility to aviod the setting configured by the administrator and enumerate the accounts on the server

17
Q

What is an attacker’s objective when performing enumeration?

A

Find user accounts and groups that will provide anonymous access once a system has been compromised/

18
Q

Which type of enumeration takes advantage of vulnerabilities in the application layer protocol used to maintain and manage routers, hubs, and switches on an IP network?

A

SNMP enumeration

19
Q

Which command-line tool identifies and reports the protocol statistics of current TCP/IP connections using NetBIOS over TCP/IP?

A

Nbtstat

20
Q

After monitoring a network via packet capture, you discover an SNMP community used on a host you’ve been attempting to target. What OID can you use to potentially discover running services information on the target?

A

.server.svSvcTable.svSvcEntry.svSvcName