Module 4 - Network Topologies and Landscapes Flashcards
1
Q
Switches
A
Subject to ARP spoofing, can result in Man-in-the-Middle attacks
2
Q
Intrusion Detection Sensors
A
can’t monitor network traffic between computers
3
Q
DMZs
A
chained exploit could allow tester to hop from server in DMZ to internal LAN
4
Q
Hubs
A
Sees all traffic
5
Q
Footprinting
A
process of identifying what hosts are on network
6
Q
System Ports
A
0-1023
IETF - standards track protocol
7
Q
User Ports
A
1024-49151
IANA - Expert Review
8
Q
Dynamic and/or Private Ports
A
49152-65535
not assigned permanently
9
Q
Port Scanners
A
Nmap
Strobe
Advanced Port Scanner
10
Q
TCP Header
A
Source Port (2 Bytes) Destination Port (2 Bytes) Sequence Number (4 Bytes) Ack (4 Bytes) Flags (13th octet, offset 7)
11
Q
ncat
A
data transfer, redirection, and debugging tool
12
Q
ndiff
A
comparing scan results
13
Q
nping
A
packet generation and response analysis tool
14
Q
zenmap
A
gui and results viewer