MOD4: Enumeration Flashcards

1
Q

What is enumeration?

A

Enumeration involves an attacker creating ACTIVE CONNECTIONS with a target system and performing queries to gain more info about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumeration techniques are conducted in an intranet environment.
True/False.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why type of information would attackers extract from enumeration?

A
  • identify points for a system attack and perform password attacks to gain unauthorized access to information system resources.
ex. 
network resources
routing tables
machine names
users and groups
applications and banners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some techniques for enumeration?

A
  • extract usernames using email IDs
  • brute force AD
  • extract user groups from windows
  • extract info using default passwords
  • extract info using DNS Zone transfer
  • extract usernames using SNMP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does this service run on:

DNS Zone Transfer

A

TCP/UDP 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port does this service run on:

NetBIOS Name Service (NBNS)

A

UDP 137

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does this service run on:

SNMP (Simple Network Management Protocol)

A

UDP 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port does this service run on:

LDAP (Lightweight Directory Access Protocol)

A

LDAP uses TCP/UDP 389
Secure LDAP uses port 636

FYI-> LDAP = domain controllers!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port does this service run on:

NFS (Network File System)

A

TCP 2049

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port does this service run on:

SMTP (Simple Mail Transfer Protocol)

A

TCP 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What port does this service run on:

SSH (Secure Shell)

A

TCP 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port does this service run on:

Internet Key Exchange (IKE)

A

UDP 500

Most likely VPN endpoints!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attackers use the NetBIOS enumeration to obtain:

a) list of computers belonging to a domain
b) list of shares on the individual hosts in the network
c) policies and passwords
d) all of the above

A

d) all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NetBIOS name is a unique 16 ASCII character string to identify the network devices over TCP/IP. 15 characters are used for the device name, and the 16th character is reserved for the service or name record type.
True/False.

A

TRUE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NetBIOS name resolution is not supported by Microsoft for IPv6.
True / False.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using the PsTools suite, what information can be retrieved when using ‘psgetsid’?

A

If you use ‘psgetsid s-1-5-21-_____-______-_____- _____ (The next 3 are unique to the system. After that, you’ll either get either of the follow for the 4th set.
500 - which means administrator
501- which means guest
1000 or up - which are accounts added to OS after installation

ex.
psgetsid S-1-5-21-_____-_____-_____-500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Using the PsTools suite, what information can be retrieved when using ‘psloggedon’?

A

Will show you who’s logged on locally.

18
Q

SNMP (Simple Network Management Protocol) enumeration is the process of enumerating user accounts and devices on a target system using SNMP.
True/False.

A

True.

19
Q

SNMP consists of a manager and an agent. What do each of them do?

A

Agents are embedded on every network device, and the manager is installed on a separate computer.

20
Q

SNMP holds 2 passwords to access and configure the SNMP agent from the management station. What are they?

A

1) Read community string (this is public by default - it allows for viewing of device/system configuration)
2) Read/write community string (this is private by default - it allows remote editing of configuration)

21
Q

SNMP: What type of information can attackers extract from SNMP?

A

Attackers use the default community strings to extract information about a device.
Attackers enumerate SNMP to extract info about:
- network resources (such as hosts, routers, devices and shares)
- network info (such as ARP tables, routing tables and traffic)

22
Q

What is LDAP ?

A

LDAP (Lightweight Directory Access Protocol) is an Internet protocol for accessing distributed directory services.
Directory services may provide any organized set of records, often in hierarchical and logical structure (such as corporate email directory).

23
Q

What is NTP?

A

NTP (Network Time Protocol) is designed to synchronize the clocks of networked computers.
It uses UDP port 123 as the primary means of communication.

24
Q

What type of information can attackers gather from a NTP server query?

A
  • list of connected hosts
  • clients IP addresses in a network, their system names and OSs
  • Internal IPs (if the NTP server is in the DMZ)
25
Q

What is NFS?

A

NFS (Network File System) is generally implemented on the computer network, where the centralization of data is required for critical resources.
FYI - NFS enumeration allows attackers to identify exported directories, list of clients connected to the NFS server along with their IP addresses and the shared data associated with the IP address.

26
Q

What is SMTP?

A

Simple Mail Transfer Protocol.
(It’s used for sending emails).
Attackers can directly interact with SMTP via the TELNET prompt and collect a list of valid users on the SMTP server.

27
Q

What tool can be used for attackers to perform DNS zone transfers?

A

nslookup
DNSRecon
dig

28
Q

What can attackers leverage from a DNS server that allows zone transfers?

A

To obtain DNS server names, hostnames, machine names, usernames, IP addresses, aliases, etc assigned within a target domain.

29
Q

What is DNSSEC zone walking?

A

A technique where an attacker attempts to obtain internal records of the DNS server if the DNS zone in not properly configured.
Can use DNSRecon for this.

30
Q

Public and Private records should never co-exist in DNS.

True / False.

A

True.

Two separate zone files, separated by a firewall or use split DNS.

31
Q

What is IPsec used for?

A

To authenticate OR to authenticate and encrypt data.

So when you identify an IPsec listener, you’re looking for UDP port 500 which is the internet key exchange.

32
Q

Which protocol does VoIP use?

A

VoIP uses Session Initiation Protocol (SIP) protocol to enable voice and video calls over an IP network.
SIP service generally uses UDP/TCP ports 2000,2001,5050, and 5061.

33
Q

What is RPC?

A

Remote Procedure Call (RPC) allows clients and servers to communicate in distributed client/server programs.
Enumerating RPC endpoints enables Attackers to identify any vulnerable services on these ports.

34
Q

What is TELNET?

A

Old school clear text remote admin port. If found, attackers can authenticate to the system, and find out hardware and software info of the target.

35
Q

What is FTP?

A

File Transfer Protocol.
FTP transfers data in plain text between the sender and the receiver, which can lead to critical information, such as usernames and passwords being leaked.
Attackers can use NMAP to scan and enumerate on PORT 21 by running FTP services.

36
Q

What is BGP?

A

Border Gateway Protocol.
It is a routing protocol used to exchange routing and reachability info between different autonomous systems present on the internet.
Enumerating on BGP allows attackers to discover IPv4 prefixes.

37
Q

What protocol is used to poison routing tables?

A

BGP (Border Gateway Protocol)

38
Q

What is the latest version of SNMP?

A

SNMP3 - it encrypts passwords and messages

39
Q

By default, LDAP traffic is transmitted securely.

True / False.

A

False.

By default, LDAP traffic is transmitted UNSECURED. Use SSL to encrypt the traffic.

40
Q

What port is used by SMB?

A

ports TCP 139 and 445 are used by SMB protocol.

FYI - SMB = Server Message Block

41
Q

What port is used by NFS?

A

PORT 2049

FYI - NFS (Network File System)