Network Enumeration PEs Flashcards
____________ is the process of collecting information without performing any analysis to identify a host, or obtain more details on a host.
Scanning
_____________ is the recording, aka sniffing, and analysis of packet streams to determine hosts and network characteristics.
Passive OS fingerprinting
_____________ is the recording, aka sniffing, and analysis of packet streams to determine hosts and network characteristics.
Passive Fingerprinting
Passive OS fingerprinting is highly intrusive so there is a detection concern status of HIGH when performing this task.
False. It is not intrusive at all and leaves very little record of presence.
SGT McGill has been using Wireshark to discover hosts on a network of interest and determine characteristics of that network. What action has SGT McGill been performing?
Passive Fingerprinting
What are the three responses a user may receive when conducting active port scans?
Open, Closed, Filtered
Determine whether the technique presented is Active Fingerprinting, Passive Fingerprinting or Neither. SPC Morales used Xprobe2 to send UDP packets to all hosts within a targeted netblock to determine OS based on the system’s response.
Active Fingerprinting
Determine whether the technique presented is Active Fingerprinting, Passive Fingerprinting or Neither. SSG Smith is using Satori to analyze a network’s DHCP parameters.
Passive Fingerprinting
A particular technique that prevents alerts from occurring to the host machine
Degrade, Deny, Destroy, Disrupting
This could potentially alert users on the network through logs, alerts, or artifacts left behind.
Active Scanning
________________ is a technique used for determining what operating system (OS) is running on a remote computer.
OS Fingerprinting
Why do you think it is important to know which service is using which port?
For understanding which data is going through secured traffic and which is not
Banner grabbing is a technique used to gain information about a remote server and is often used as part of a reconnaissance attack.
True
__________ is a tool used to discover live hosts, services, network inventory, managing service upgrade schedules, monitoring host or service uptime, filters/firewalls, or specific operating systems by analyzing the response from the raw IP packets sent to a target system.
nmap
A lot of information can be discovered during scanning enumeration. Select what is NOT part of the list.(According to information provided in the slides). Choose the letter associated with the proper answer.
A. Protocols – OS, type of server
B. Users and passwords
C. IP address – size of network, network map
D. Binary configuration,Fetch-Decode-Execute
E. Services – exploitation, protection measures
D. Binary configuration,Fetch-Decode-Execute