Module 2 - Footprinting and Reconnaissance Flashcards
Which of these is an open-source framework for doing automated recon and info-gathering activities to learn about a target organization?
A) OSINT Framework
B) SpeedPhish Framework
C) WebSploit Framework
D) Browser Exploitation Framework
A
Which of these Google Dork (Google hacking) operators would you use to show certain file extensions on a website?
A) ext
B) filetype
C) inurl
D) allinurl
E) site
F) location
B
Passive reconnaissance involves collecting information through which of the following?
A) Social engineering
B) Network traffic sniffing
C) Man in the middle attacks
D) Publicly accessible sources
D
Which type of footprinting involves gathering domain information, such as domain name, contact details of the owner, and creation & expiration dates?
A) VoIP footprinting
B) Whois footprinting
C) VPN footprinting
D) Email footprining
B
In order to make convincing phishing e-mails, it helps to know about the company you are going to impersonate. The time you spend on researching this information is called what?
A) Exploration
B) Reconnaissance
C) Investigation
D) Enumeration
B
You need to monitor your corporate website to analyze the traffic and learn things such as the geographical location of people visiting the site. Which tool would be best suited for this?
A) Webroot
B) Web-Stat
C) WAFW00F
D) WebSite-Watcher
B
What is the collection of overt and publicly available information known as?
A) Real intelligence
B) Human intelligence
C) Open-source intelligence
D) Social intelligence
C
Which of these would be the best choice to surf the internet anonymously?
A) Use shared WiFi
B) Use public VPN
C) Use SSL sites when entering personal information
D) Use Tor network with multi-node
D
Which of these tools can perform DNS lookups and find info such as DNS domain names, computer names, IP addresses, DNS records, and network Whois records?
Note: zANTI is an Android tool for spoofing MAC addresses, creating malicious Wi-Fi hotspots, and hijacking sessions. Knative is for managing containers. Towelroot is for rooting a mobile device. Bluto is the only tool in this list that queries DNS info.
A) Bluto
B) zANTI
C) Knative
D) Towelroot
A
You have been sent a suspicious e-mail message and want to see who sent it. After looking at the header you see that it was received from an unknown sender at the IP address 145.146.50.60. What web site will allow you to find out more information about an IP address, including who owns that IP?
Note: ARIN is the American Registry for Internet Numbers and can tell you who owns a particular IP address. The other three are domain registrars and can tell you who owns a domain name.
A) http://www.tucowsdomains.com/whois
B) https://whois.arin.net
C) https://www.networksolutions.com/whois
D) https://www.godaddy.com/whois
B
Where can you go to see past versions and pages of a website?
A) Samspade.org
B) Search.com
C) Archive.org
D) AddressPast.com
C
During which hacking process do you surf the internet looking for information about your target company?
A) Scanning
B) Enumerating
C) Footprinting
D) System Hacking
C
Which Google search operator would limit searches to one domain?
A) [location:]
B) [site:]
C) [allinurl:]
D) [link:]
B
Which regional internet registry should you use to get detailed info about an IP address in France?
Note: The major RIRs include:
ARIN (American Registry for Internet Numbers) (https://www.arin.net)
AFRINIC (African Network Information Center) (https://www.afrinic.net)
APNIC (Asia Pacific Network Information Center) (https://www.apnic.net)
RIPE (Réseaux IP Européens Network Coordination Centre) (https://www.ripe.net)
LACNIC (Latin American and Caribbean Network Information Center) (https://www.lacnic.net)
A) ARIN
B) APNIC
C) LACNIC
D) RIPE
D
Your network has been breached. You review your logs and discover that an unknown IP address has accessed the network through a high-level port that was not closed. You trace the IP to a proxy server in Argentina. After calling the company that owns the server, they trace it to another proxy in Germany. You call them and they trace it to another proxy in China. What proxy tool has the attacker used to cover his tracks?
A) ISA proxy
B) IAS proxy
C) TOR proxy
D) Cheops proxy
C