Lesson 3:Reconnaissance and Intelligence Gathering Flashcards
The process of attempting to contact each network port on the target system and see which ones are open is called as
port scanning.
There are 1,024 well-known ports that are
usually associated with specific services.
The Metasploit framework is a very powerful tool that can be used by cybercriminals as well as ethical hackers to
probe systematic vulnerabilities on networks and servers.
Syslog is a protocol used to send
system log or event messages to a specific server.
netstat
A command-line tool for monitoring network connections both incoming and outgoing as well as viewing routing tables, interface statistics, and so on.
access control list (ACL)
A list that specifies which users or system processes have access to a specific object, such as an application or a process, in addition to what operations users can perform.
Whois
provides information about a domain’s registrar and physical location. This information includes an organization’s physical address, registrar, contact information, and other details.
netflow
A Cisco network protocol that collects IP traffic information, allowing network traffic monitoring.
passive fingerprinting
A type of fingerprinting that relies on logs and other existing data, which may not provide information needed to fully identify targets.
nmap
A command-line port scanner that provides a broad range of capabilities, such as multiple scan modes, intended to bypass firewalls and other network protection devices.
operating system (OS) fingerprinting
The ability to identify an operating system based on network traffic that it sends.
active reconnaissance
A type of computer attack that uses host scanning tools to gather information about systems, services, and vulnerabilities.
According to Cisco log levels, level 4 represents
a warning. The example for warning is a configuration change.
A scanning technique, like Transmission Control Protocol synchronize (TCP SYN), is the most popular scan method because it
uses a TCP SYN packet to verify a service response. TCP SYN is quick and unobtrusive.
Nmap’s operating system identification flag is
–o and it enables the operating system (OS) detection.
–A also enables OS identification and other features.