Hacking - Section 5 (Scanning) Flashcards

1
Q

What are the goals of scanning?

A

Find vulnerabilities on the machine, focusing on technology information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When scanning, what are we looking for?

A

Open ports on the machine of the target, which are basically connections that allow communication between the computer and the internet, websites, the software and the version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the most secure machines?

A

Home devices, and devices that are not hosting or are connect to a network (like a enterprise or a server host).
65535 ports at total.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the best machines to exploit? and why?

A

Enterprises ones and those which are connected to a big server or hosting one, since they are obligated to maintain an open post.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the TCP?

A

A protocol that sends data, known as packet.
Transmission control protocol, in order to appear things in our screen or the internet, we send a TCP and receive one from the network host, so you can both start communicating.
Checks if the other part has received the data, and if not, it keeps it saved at the server that’s why it is the slower one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the three way handshake?

A

They are the steps to stablish communication
1 - SYN (synchronize sequence number)
informs that the client wants to start a communication w/ the server.
2- SYN/ACK- server sends a response to the client.
3- ACK - client receives the answer and acknowledge it, starting the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the UDP?

A

User data protocol, much faster than the TCP, and error connection is not necessary, it won’t check if the others received the data, that’s why it is faster, used to transmit broadcasts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the arp command? how to use it?

A

A command that discover devices connected to a network (ip).
sudo + arp + –help
sudo + arp + -a + IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the netdiscover command? how to use it?

A

A command that discover devices connected into a network (ip).
sudo + netdiscover + -r + IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With what numbers does routers usually finish in their IP adress?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the command to find routers?

A

netstat - nr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is nmap? how to use it (open/scan) ?

A

its a command that will scan a device in order to find open ports in it.
open - sudo + nmap + - -help
scan - sudo + nmap+ IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to scan all the devices connected to a network?

A

Type all the IP address of the machine and replace the last number with /24?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the command to scan quickly on the nmap?
Can u run it normally?
Tell some characteristics of it (speed/traces).

A
SYN scan (sS)
sudo + nmap + -sS + IP
No, u need sudo permission.
It is faster because it does not start a TCP connection, and it leaves less traces than the other (not so detectable).
Only the DYR is being sent on the 3 way handshake.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the nmap scan that is easily detectable and why?

A

sudo + nmap + -sT + IP

Stablishes a full TCP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a port that is ‘‘filtered’’?

A

A port which the scan couldn’t tell if it was open or closed.

17
Q

What is the UDP scan and how to use it?

A

A scan that is elaborated to UDP connections.

sudo nmap -sU + IP

18
Q

How to open the nmap manual?

A

man + nmap

19
Q

What’s the service version scan and how to use it?

And its level of noise?

A

A scan that shows the version of the service running on an open port.
sudo + nmap + sV + IP
Medium noise.

20
Q

What’s the oS scam and how to use it?

And its level of noise?

A

Its a scam that shows the operating system of the target.
sudo + nmap + sO + IP
Medium noise.

21
Q

What’s the MAC address of virtual machines (kali linux) ?

how do they start?

A

08:00

22
Q

What’s the honeypot?

A

A purposely virtual machine put into a system, since it is the most vulnerable one hackers will go first for it and they will get caught since its a trap.

23
Q

What can u do w/ the version of the service running on a port?

A

Get the version and look on the internet or other means to search for specific vulnerabilities for it.

24
Q

How to set intensity with the -sV?

A

sudo nmap -sV + –version-intensity + (1 to 9) + IP

25
Q

What’s one of the most aggressive scams and what does it enables?
Level of noise?

A

-A
sudo nmap -A + IP
It enables the -sO, -sV and nmap script scams.
Very high.

26
Q

What’s the sN command and how to use it?

A

A scan which tells all the devices connected to a network (similar to netdiscover).
sudo nmap + -sN + IP.

27
Q

What’s the -p command and how to use it?

A

A specifier of ports, it will only scan the port that you choose.
sudo nmap + -p + Nº of the port + IP
you can choose more than separating them by a coma (80, 30, 90) or by a range: 1 -100

28
Q

What’s the -f command?

A

A command that’ll scan 100 ports (100 most used).

29
Q

How to save a nmap result?

Inside a file and creating one

A
inside a file - 
sudo nmap -sV + IP + >> + name of archive.txt
(use cat after it to read the text)
to create a file - 
sudo nmap + oN + name + -sS + IP
30
Q

What is a firewall and a IDS?

A

A security system that monitors network traffic, there are network and host based firewalls (which only filters what goes through a specific machine).
IDS is intrusion detection system (software).

31
Q

What is a decoy and how to use it?

How to hide it more?

A

Its when the scam you’ve done is split into more ‘decoys’ that you have created, the IDS will detect them but won’t know which one is the real ‘you’, so you hide your IP.
sudo nmap -D + RND:+number of IPs u want + IP

sudo nmap -D + type the IPs yourself so you can hide the original one even more (separate using coma). (sudo nmap -D 192.168.5.3, etc)
ME = your ip.

32
Q

What is the -T command and how to use it?

A

Its a scam for IDS evasion.

sudo nmap -T + 0/1 + IP

33
Q

How to create a code inside a nano file?

A

Use + .py at the end of the name of the archive, so it will be opened and coded on python.

34
Q

How to open a nano file after you’ve finished it?

A

Just type nano + name of archive, it will let you edit all again.