MOD3: Scanning Networks Flashcards
Network scanning refers to a set of procedures used for identifying hosts, ports, and services in a network.
True / False.
True.
Network scanning is one of the components of intelligence gathering which can be used by an attacker to create a profile of the target organization.
Which one(s) is an objective of network scanning?
a) to discover live hosts, IP address, and open ports of live hosts
b) to discover OSs and system architecture
c) to discover services running on hosts
d) to discover vulnerabilities in live hosts
e) all of the above
All of the above.
TCP communication flags: Data contained in a packet should be processed immediately. a) FIN b) ACK c) PSH d) SYN e) RST f) URG
f) URG (urgent)
TCP communication flags: Resets a connection. a) FIN b) ACK c) PSH d) SYN e) RST f) URG
e) RST (reset)
TCP communication flags: Acknowledges the receipt of a packet. a) FIN b) ACK c) PSH d) SYN e) RST f) URG
b) ACK (acknowledgement)
TCP communication flags: There will be no further transmission. a) FIN b) ACK c) PSH d) SYN e) RST f) URG
a) FIN (finish)
TCP communication flags: Sends all buffered data immediately. a) FIN b) ACK c) PSH d) SYN e) RST f) URG
c) PSH
TCP communication flags: Initiates a connection between hosts. a) FIN b) ACK c) PSH d) SYN e) RST f) URG
d) SYN (synchronize)
Which is better, TCP or UDP?
TCP is better because packets are more concise.
UDP is not as strict, it’ll just say ‘send another request’.
TCP sequence number of bits. First 16 bits = \_\_\_\_\_\_\_\_\_\_\_ Next 16 bits = \_\_\_\_\_\_\_\_\_\_\_ Next 32 bits = \_\_\_\_\_\_\_\_\_\_\_ Next 32 bits = \_\_\_\_\_\_\_\_\_\_\_
First 16 bits = source port
Next 16 bits = destination port
Next 32 bits = sequence no.
Next 32 bits = ACK (acknowledgement no.)
What type of handshake is for TCP session establishing and for TCP session termination?
TCP Session Establishment –> 3 way handshake
TCP Session Termination –> 4 way handshake for shut down
What tool is useful for making payloads?
Metasploit.
It also has built in scanners!
How many ports are there per TLP (Transport Layer Protocol?
65,536
How many ports will NMAP scan?
NMAP will scan the top 1,000 ports.
What is RFC73 compliant?
It describes how a system should react to illegal requests.
RFC-Compliance code is code that follows the formal requirements for the protocols in the TCP/IP stack is specified in a number ofRFCdocuments published by the Internet Engineering Task Force, aka the IETF.
What is a Christmas tree packet?
A Christmas Tree Attack is a very well known attack that is designed to send a very specifically crafted TCP packet to a device on the network.
Why would an attacker send TCP probe packets set with an ACK flag to a remote device?
To analyze the header information (TTL and WINDOW field) of received RST packets to determine if the port is open or closed.
If the TTL value of the RST packet on a particular port is less than the boundary value of 64, then that port is open.
True/False.
True.