Lesson 3- Footprinting and Gathering Intelligence Flashcards

1
Q

What OSINT tool is useful for finding known vulnerabilities, default passwords especially on iOT devices

A

Shodan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name a common DNS Tool that can be used for Windows and Linux

A

Nslookup

Dig is the Linux tool only and good for reverse lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What tool can I use for getting details on a company’s domain name such as address, contact numbers, etc.

A

WhoIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some tools for image searches and why are these important

A

TinEye
Google
Yandex
Bing

compromised images of target organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to OWASP enumeration is also referred to as

A

Predictable Resource Location
File or Directory Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is used to identify unlinked URL’s or IP’s from a website to gain access to unprotected resources

A

Forced Browsing

typically a manual process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Field in a digital signature allowing a host to be identified by multiple host names/subdomains

A

Subject Alternate Name
(SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where can I find logs of Public Certificate Authorities (CA)

A

Certificate Transparency (CT) Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the current model of validating a Digital Certificate

A

Using the Online Certificate Status Protocol (OCSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a process where the web server must validate a certificate called

A

Stapling the Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Linux tool that is great for discovering Metadata and Fingerprinting an organizations and what type of scripting does it use

A

Metagoofil and Python

flags
-d website - scan for docs
-t PDF - scan for pdf docs
-l 75 - search for 75 docs
-n 25 - download 25 docs
-o dirname - save downloads to dirname directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Graphical OSINT tool (Windows only) that specializes in working with documents that have been downloaded

A

FOCA

requires a local SQL Server to store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ in an intuitive tool that can search a company’s visible threat landscape and uses multiple methods such as Google Comodo Social media and banner Grabbing functionality using Shodan

A

theHarvester

theharvester -d website -b LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool is similar to theHarvester but more robust and uses dozens of different modules

A

Recon-ng

Modules Inlcude
Whois
PGP key search
Social Medial profiles associations
File crawler
DNS Record enumerator

also used Have | Been Pwnded database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the CLI Tool that helps users visualize gathered OSINT Data and uses an extensive library. In addition what are these libraries called that automate the querying of public databases

A

Maltego and Transforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the search engine designed to locate and index IoT devices that are connected to the Internet

A

Shodan

Great for Recon to find IoT devices that can be exploited to gain access

17
Q

What is a common tool for website enumeration

A

Dirbuster

18
Q

T or F nslookup is not ideal for OSINT gathering since it is not easy to capture data in interactive mode

A

True
That is when you want to use DIG