MODULE 4: Enumeration Flashcards
What term involves an attacker creating active connections with a target system and performing directed queries to gain more information about the target?
(CONDUCTED IN AN INTRANET ENVIRONMENT)
Enumeration
Extracting usernames using email IDs, brute forcing active directory, extracting user groups from windows, extracting info using default passwords, extracting information using DNS zone transfers, and extracting usernames using SNMP are all examples of what?
Enumeration
What protocol monitors and manages network devices such as routers or switches and is used to modify the device configs and has network devices report back to the central network management system? (NMS)
SNMP
What was the vulnerability of early SNMP?
It passed clear-text passwords over the network.
Which version of SNMP finally encrypted username/passwords in order to patch the main vulnerability of SNMP?
a. SNMPv1
b. SNMPv2
c. SNMPv3
d. SNMPv4
c. SNMPv3
What NTP tool traces a chain of NTP servers back to the primary source?
ntptrace