Overview of Network Scanning Flashcards

1
Q

IRDP

A

The ICMP Router Discovery Protocol (IRDP) is a routing protocol that allows a host to discover the IP addresses of active routers on its subnet by listening to router advertisement and solicitation messages on its network. The attacker can add default route entries on a system remotely by spoofing router advertisement messages. Since IRDP does not require any authentication, the target host will prefer the default route defined by the attacker to the default route provided by the DHCP server. The attacker accomplishes this by setting the preference level and the lifetime of the route at high values to ensure that the target hosts will choose it as the preferred route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP

A

Address Resolution Protocol (ARP) is a stateless TCP/IP protocol that maps IP network addresses to the addresses (hardware addresses) used by a data link protocol. Using this protocol, a user can easily obtain the MAC address of any device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that provides an IP address to an IP host. In addition to the IP address, the DHCP server also provides configuration related information such as the default gateway and subnet mask. When a DHCP client device boots up, it participates in traffic broadcasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS

A

DNS is the protocol that translates a domain name (into an IP address . The protocol uses DNS tables that contain the domain name and its equivalent IP address stored in a distributed large database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hping3 -1 –p 80

A

ICMP Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hping3 –A –p 80

A

ACK scan on port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hping3 -2 –p 80

A

UDP scan on port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hping3 -8 50-60 –S -V

A

SYN scan on port 50-60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hping3 –F –P –U –p 80

A

FIN, PUSH and URG scan on port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hping3 -1 10.0.1.x –rand-dest –I eth0

A

Scan entire subnet for live host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hping3 -9 HTTP –I eth0

A

Intercept all traffic containing HTTP signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nmap scripting engine (NSE)

A
provides scripts that reveal all sorts of useful information from the target web server.
Network discovery
More sophisticated version detection
Vulnerability detection
Backdoor detection
Vulnerability exploitation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ping of death

A

In a ping of death (PoD) attack, an attacker tries to crash, destabilize, or freeze the target system or service by sending malformed or oversized packets using simple ping command. For instance, the attacker sends a packet that has a size of 65,538 bytes to the target webserver. This size of the packet exceeds the size limit prescribed by RFC 791 IP, which is 65,535 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SYN flooding

A

In an SYN attack, the attacker sends a large number of SYN requests to the target server (victim) with fake source IP addresses. The attack creates incomplete TCP connections that use up network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP hijacking

A

TCP session hijacking allows attackers to take over an active session by bypassing the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Smurf attack

A

In a Smurf attack, the attacker spoofs the source IP address with the victim’s IP address and sends a large number of ICMP ECHO request packets to an IP broadcast network. It makes all the hosts on the broadcast network to respond to the received ICMP ECHO requests.

17
Q

While performing a UDP scan of a subnet, you receive an ICMP reply of Code 3/Type 3 for all the pings you have sent out. What is the most likely cause of this

A

UDP port is closed

18
Q

UDP scan no response

A

Port is either open | filtered

19
Q

Microsoft baseline security analyzer (MBSA)

A

Allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations in Microsoft Windows products.

20
Q

Nmap -sO

A

IP protocol scan allows you to determine which IP protocols (TCP, ICMP, IGMP, etc.) are supported by target machines. This isn’t technically a port scan, since it cycles through IP protocol numbers rather than TCP or UDP port numbers.

21
Q

Nmap -sT

A

TCP connect scan is the default TCP scan type when SYN scan is not an option. This is the case when a user does not have raw packet privileges. Instead of writing raw packets as most other scan types do, Nmap asks the underlying operating system to establish a connection with the target machine and port by issuing the connect system call.

22
Q

Nmap -sS

A

SYN scan is the default scan option used for scanning thousands of ports per second on a fast network not hampered by restrictive firewalls.

23
Q

Nmap -sU

A

UDP scan works by sending a UDP packet to every targeted port.