Lesson 5 - Preparing the Vulnerability Scan Flashcards

1
Q

The points at which a network or application receives external connections or I/O that are potential vectors to be exploited by a threat actor

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the stages of the lifecycle of a vulnerability

A
  1. Discover - vuln exists
  2. Coordinate - CVE & CWE
  3. Mitigate - patch released
  4. Manage - patch applied
  5. Document -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the time when a system is most at risk of a vulnerability, generally between patch release and patch applied is referred to as ________

A

Risk Gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of initial active reconnaissance techniques to gather information about network hosts and services running on open ports

A

Banner Grabbing

Common Tools are Wget, Nmap, Curl and netcat (nc)

examples are
wget <target IP?> -S - Print HTTP Headers

nmap -sV <target> -p <port></port></target>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the essential first step in active reconnaissance phase of the PenTest

A

Mapping the Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do most mapping tools use for additional enumeration from hosts

A

Windows Management Instrumentation (WMI) and Simple Networking Monitoring Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some of the popular free and commercial network mapping tools

A

SolarWinds, Intermapper, WhatsUp Gold, PRTG, Spiceworks, Nmap and Zenmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name a popular tool that can import results of a vulnerability scan and then attempt to exploit it

A

Metasploit

this tool is primarily used to exploit and not necessary a good choice for scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some ways that a PenTester can identify if a Web App Firewall is in place

A

A WAF can give away their existence by adding a personal cookie in the HTTP packet

some WAF products such as Citrix Netscaler use a technique called Header alternation which changes the original response to confuse the attacker.

Other WAF will identify themselves by their response such as you have been blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T or F if a Firewall permits port 80 it is possible to attach a payload in a HTTP Header?

A

True

You can set any malicious packet to port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the technique that uses traceroute and port scanning to discover details of the internal network

A

Firewalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a PenTester avoid Anti-Virus during a test and what specific tools would they use.

A

Use a Metamorphic Virus which transforms as they propagate

Obfsucate a known signature using a tool such as ObfuscatedEmpire

Use specialized tools or payloads such as fileless malware that uses OS embedded functions.

Using SET with Metasploit would be the ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a popular Attack Surface analyzer

A

Censys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the method to test firewall rules, evade intrusion detection or cause a denial of service

A

Crafting Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 stages of Packet Crafting

A
  1. Assemble - create
  2. Edit - modify contents
  3. Pay - send/resend
  4. Decode - capture and analyze
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name some popular hacking tools that use Packet Crafting

A

Metasploit
Scapy
hping - CLI

17
Q

What ports do WebServers use vs Database Servers?

A

Web - port 80/443

SQL Server will listen on TCP Port 1433 or UDP port 1434

18
Q

Name a popular SQL Scanning tool that is built into Kali Linuz

A

SQLmap

19
Q

Name another tool built into Kali Linux designed to scan webservers for known vulnerabilities

A

Nikto