Information Gathering and Vulnerability Scanning Flashcards
What is the process of collecting as much information as you can about a target?
Reconnaissance
When do pentesters typically conduct reconnaissance?
During the planning, initial access, and post-exploitation phases of pentesting.
What is the process of assessing a target to collect preliminary knowledge about it without actively engaging it or its assets?
Passive reconnaissance
Which information gathering technique involves expanding your knowledge of hostnames in use, breadth of network, and even information about some technical contacts within an organization?
DNS Recon
What can you use to validate ownership of an IP address in your scope list?
The regional internet registry (RIR) like ARIN (for America)
What are some command-line tools you can use to access information from DNS?
Commands such as dig or whois.
What tool can you use to resolve the name of a domain to an IP address?
nslookup
Which open-source Python framework is often included in Kali and is a powerful tool with independent modules and a database for storing engagement information during recons?
Recon-ng
Which Python-based framework is useful for DNS recon, can be both active and passive, and can help gather information from webpages to discover domains, subdomains, and email addresses?
theHarvester
What is an open-source framework that pentesters can use to aid in data mining process? It is a static web page focused on information gathering and provides web links and resources.
OSINT Framework
What is an interactive data mining software tool that can help users visualize and analyze relationships using publicly accessible data from the Internet?
Maltego
What is an automated discovery process that can help identify metadata and property information stored in the file info of Microsoft Products?
FOCA (Fingerprinting Organizations with Collected Archives)
What is the name for queries you can use to find data about your targets?
Dorks
What is an open-source repository where people can share source codes and collaborate with others?
GitHub
Which tool was created by the University Of Michigan in 2015 and allows you to query host and certificate information from Internet-wide scans using full-text searches or field-base searches with regex and logic operators enriching your queries?
Censys
Which search engine scans the entire Internet, parsing banners for services and categorizing the data returned by each device?
Shodan
What is defined by actively engaging a target to detect open ports, web pages, services, and exploitable weaknesses?
Active reconnaissance
What is the command-line tool that utilizes various network protocols and advanced features for surveying hosts for open TCP and UDP ports, fingerprinting operating systems, extracting service banners, and much more?
NMAP
What is a simple method of determining if a host is alive on a network?
A ping scan