lesson 2 Flashcards
1
Q
nist special publication 800-41
A
-security guideline recommending that you block incoming ping traffic
2
Q
malicious ping
A
-attackers can observe the ttl values in ping replies to identify operating systems
3
Q
juniper ttl value
A
64
4
Q
linux 2.4 ttl value
A
255
5
Q
red hat ttl value
A
64
6
Q
mac ttl value
A
64
7
Q
windows ttl value
A
128
8
Q
netstat
A
-used to determine if a particular service is listening on a network interface
9
Q
nslookup
A
-resolves hostnames to test dns
10
Q
nmap
A
- network mapper
- used to fingerprint services on open ports
11
Q
nmap scan types
A
- sS, tcp syn
- sT, tcp connect
- sU, udp
12
Q
nmap -sS
A
- tcp syn
- default option
- doesnt complete tcp connections
- stealthy
- can identify open, closed, and filtered ports
- requires root privileges
13
Q
nmap -sT
A
- tcp connect
- default without root privileges
- connections are completed
- connections are logged by the target
14
Q
nmap -sU
A
- udp scan
- used to scan for udp services
- slower and more difficult to scan
15
Q
nmap options
A
- port specification (p )
- ping scan, disable port scan (-sn)
- treat all hosts as online, skip host discovery (-Pn)
- never do dns resolution (-n)
- service fingerprinting (-sV)
- increase verbosity (-v, -vv)
- display the reasoning for nmaps’ findings (–reason)