Footprinting and Reconnaissance Flashcards

1
Q

What is Sherlock? (Software)

A

Sherlock is a tool to search a vast number of social networking sites for a target username. This tool helps the attacker to locate the target user on various social networking sites along with the complete URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is BeRoot? (Software)

A

BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker to escalate their privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is OpUtils? (Software)

A

SNMP enumeration protocol that helps to monitor, diagnose and troubleshoot IT resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Passive Footprinting

A

Passive footprinting involves gathering information about the target without direct interaction. It is mainly useful when the information gathering activities are not to be detected by the target. Performing passive footprinting is technically difficult, as active traffic is not sent to the target organization from a host or anonymous hosts or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Active Footprinting?

A

Active footprinting involves gathering information about the target with direct interaction. In active footprinting, the target may recognize the ongoing information gathering process, as we overtly interact with the target network. Active footprinting requires more preparation than passive footprinting, as it may leave traces that may alert the target organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Intelius? (Software)

A

Attackers can use the Intelius people search online service to search for people belonging to the target organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is TinEye? (Software)

A

A reverse image search service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Mention? (Software)

A

Mention is an online reputation tracking tool that helps attackers in monitoring the web, social media, forums, and blogs to learn more about the target brand and industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Google query can be used to find Cisco VPN client passwords?

A

“[main]” “enc_GroupPwd=” ext:txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Google query can be used to find configuration pages for online VoIP devices?

A

intitle:”Sipura.SPA.Configuration” -.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Professional Toolset? (Software)

A

Professional Toolset (https://tools.dnsstuff.com) and DNS Records (https://network-tools.com) are DNS footprinting tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Infoga? (Software)

A

Infoga is a tool used for gathering email account information from different public sources and it checks if an email was leaked using the haveibeenpwned.com API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Octoparse? (Software)

A

Octoparse offers automatic data extraction, as it quickly scrapes web data without coding and turns web pages into structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Metagoofil? (Software)

A

Metagoofil extracts metadata of public documents (pdf, doc, xls, ppt, docx, pptx, and xlsx) belonging to a target company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an advanced Google search query that returns a list of FTP servers by IP address, which are mostly Windows NT servers with guest login capabilities?

A

inurl:~/ftp://193 filetype:(php | txt | html | asp | xml | cnf | sh) ~’/html’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Shoulder Surfing?

A

Shoulder surfing is the technique of observing or looking over someone’s shoulder as he/she keys in information into a device. Shoulder surfing helps penetration tester to find out passwords, personal identification numbers, account numbers, and other information. Penetration tester sometimes even uses binoculars or other optical devices, or install small cameras to record actions performed on victim’s system, to obtain login details and other sensitive information.

17
Q

What is an advanced Google search query used for VoIP footprinting to extract Cisco phone details?

A

inurl:“NetworkConfiguration” cisco

18
Q

What is Recon-Dog?

A

Recon-dog is an all-in-one tool for all basic information gathering needs. It uses APIs to collect information about the target system.

Features:
Censys: Uses censys.io to gather a massive amount of information about an IP address.
NS lookup: Performs name server lookup
Port scan: Scans most common TCP ports
Detect CMS: Can detect 400+ content management systems
Whois lookup: Performs a Whois lookup
Detect honeypot: Uses shodan.io to check if the target is a honeypot
Find subdomains: Uses findsubdomains.com to find subdomains
Reverse IP lookup: Performs a reverse IP lookup to find domains associated with an IP address
Detect technologies: Uses wappalyzer.com to detect 1000+ technologies
All: Runs all utilities against the target

19
Q

Which flag do you pass to sublist3r to use custom search engines (comma delimited)?

A

-e

20
Q

Which feature in FOCA allows an attacker to find more servers in the same segment of a determined address?

A

PTR scanning