MODULE 3: Scanning Networks Flashcards
What is the go to tool for extracting info such as live hosts on network, open ports, services, type of packet filters, firewalls, and OS/Versions used?
NMAP
NMAP Switches:
Match the switch to its meaning/use.
- -s output
- -p Fast Scan (top 100 ports)
- -O port
- -o scan
- -T Operating System
- -F Time
- -oX XML Output to the file “xml.file”
- -s 4. output
- -p 6. Fast Scan (top 100 ports)
- -O 2. port
- -o 1. scan
- -T 3. Operating System
- -F 5. Time
- -oX 7. XML Output to the file “xml.file”
Match the nmap scan to its description.
- -sT XMAS scan, uses the Fin, Urg, Psh flags
- -sS TCP Scan, full connect
- -sX SYN scan, stealth scan, “half-open”
- -sn idle scan
- -sI ping scan
- -sT 3. XMAS scan, uses the Fin, Urg, Psh flags
- -sS 1. TCP Scan, full connect
- -sX 2. SYN scan, stealth scan, half-open connection
- -sn 5. idle scan
- -sI 4. ping scan
If a hacker’s objective was to port scan a target network, what would they first do to cut down on time and their footprint in the network by making sure hosts are alive first?
Ping Sweep
What type of privileges does nmap require to fully function correctly?
root/sudo
nmap -sV host.domain.com -p 80
is an example of ______ ________?
banner grabbing
What command line network scanning and packet crafting tool for TCP/IP can be used for network security auditing, firewall testing, ect.?
Hping2/3
What type of hping2/3 scan can a hacker use to spoof the source IP address and source ports?
ACK scan
ex: hping3 -a 10.10.10.25 -p 80
hping2 -1 host.domain.com
is an example of:
an ICMP scan on a remote computer using hping2 syntax
What type of scan sends ARP request probes to target hosts where receiving an ARP response back indicates that the host is alive?
ARP Ping Scan
In an IDLE IPID scan what indicates an open port?
a. target sends SYN/ACK, zombie responds with RST, and IPID increases by 2
b. target sends RST, no response from zombie, IPID increases by 1
a. target sends SYN/ACK, zombie responds with RST, and IPID increases by 2
If an attacker's computer sends an IPID of 31400 to a zombie (Idle Scanning) computer on an open port, what will be the response? A. 31400 B. 31402 C. The zombie will not send a response D. 31401
B. 31402
TCP SYN Flood attack uses the three-way handshake mechanism.
1. An attacker at system A sends a SYN packet to victim at system B.
2. System B sends a SYN/ACK packet to victim A.
3. As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A.
This status of client B is called _________________
A. “half-closed”
B. “half open”
C. “full-open”
D. “xmas-open”
B. “half open”
What type of port scan is shown below?
Scan directed at open port:
Client Server
192.5.2.92:4079—————–FIN——————-192.5.2.110:23
192.5.2.92:4079 <——–NO RESPONSE——- 192.5.2.110:23
Scan directed at closed port:
Client Server
192.5.2.92:4079—————–FIN——————-192.5.2.110:23
192.5.2.92:4079 <———–RST/ACK————- 192.5.2.110:23
A. Idle Scan
B. FIN Scan
C. XMAS Scan
D. Windows Scan
B. FIN Scan
An attacker is using nmap to do a ping sweep and a port scanning in a subnet of 254 addresses. In which order should he perform these steps?
A. The sequence does not matter. Both steps have to be performed against all hosts.
B. First the port scan to identify interesting services and then the ping sweep to find hosts responding to icmp echo requests.
C. First the ping sweep to identify live hosts and then the port scan on the live hosts. This way he saves time.
D. The port scan alone is adequate. This way he saves time.
C. First the ping sweep to identify live hosts and then the port scan on the live hosts. This way he saves time.