PE 4 - Sniffing and Evasion Flashcards
Given the following Wireshark filter, what is the attacker attempting to view?
A. SYN, SYN/ACK, ACK
B. SYN, FIN, URG, and PSH
C. ACK, ACK, SYN, URG
D. SYN/ACK only
A. SYN, SYN/ACK, ACK
A target machine (with a MAC of 12:34:56:AB:CD:EF) is connected to a switch port. An attacker (with a MAC of 78:91:00:ED:BC:A1) is attached to a separate port on the same switch with a packet capture running. There is no spanning of ports or port security in place. Two packets leave the target machine. Message 1 has a destination MAC of E1:22:BA:87:AC:12. Message 2 has a destination MAC of FF:FF:FF:FF:FF:FF. Which of the following statements is true regarding the messages being sent?
A. The attacker will see message 1.
B. The attacker will see message 2.
C. The attacker will see both messages.
D. The attacker will see neither message.
B. The attacker will see message 2.
You have successfully tapped into a network subnet of your target organization. You begin an attack by learning all significant MAC addresses on the subnet. After some time, you decide to intercept messages between two hosts. You begin by sending broadcast messages to Host A showing your MAC address as belonging to Host B. Simultaneously, you send messages to Host B showing your MAC address as belonging to Host A. What is being accomplished here?
A. ARP poisoning to allow you to see all messages from either host without interrupting their communications process
B. ARP poisoning to allow you to see messages from Host A to Host B
C. ARP poisoning to allow you to see messages from Host B to Host A
D. ARP poisoning to allow you to see messages from Host A destined to any address
B. ARP poisoning to allow you to see messages from Host A to Host B
Your target subnet is protected by a firewalled DMZ. Reconnaissance shows the external firewall passes some traffic from external to internal, but blocks most communications. HTTP traffic to a web server in the DMZ, which answers to www.somebiz.com, is allowed, along with standard traffic such as DNS queries. Which of the following may provide a method to evade the firewall’s protection?
A. An ACK scan
B. Firewalking
C. False positive flooding
D. TCP over DNS
D. TCP over DNS
Which of the following is the best choice in setting an NIDS tap?
A. Connect directly to a server inside the DMZ.
B. Connect directly to a server in the intranet.
C. Connect to a SPAN port on a switch.
D. Connect to the console port of a router.
C. Connect to a SPAN port on a switch.
You have a large packet capture file in Wireshark to review. You want to filter traffic to show all packets with an IP address of 192.168.22.5 that contain the string HR_admin. Which of the following filters would accomplish this task?
A. ip.addr==192.168.22.5 &&tcp contains HR_admin
B. ip.addr 192.168.22.5 && “HR_admin”
C. ip.addr 192.168.22.5 &&tcp string ==HR_admin
D. ip.addr==192.168.22.5 + tcp contains tide
A. ip.addr==192.168.22.5 &&tcp contains HR_admin
Which of the following techniques can be used to gather information from a fully switched network or to disable some of the traffic isolation features of a switch? (Choose two.)
A. DHCP starvation
B. MAC flooding
C. Promiscuous mode
D. ARP spoofing
B. MAC flooding
D. ARP spoofing
Which of the following is true regarding the discovery of sniffers on a network?
A. To discover the sniffer, ping all addresses and examine latency in responses.
B. To discover the sniffer, send ARP messages to all systems and watch for NOARP responses.
C. To discover the sniffer, configure the IDS to watch for NICs in promiscuous mode.
D. It is almost impossible to discover the sniffer on the network.
D. It is almost impossible to discover the sniffer on the network.
Which of the following could provide useful defense against ARP spoofing? (Choose all that apply.)
A. Use ARPWALL.
B. Set all NICs to promiscuous mode.
C. Use private VLANs.
D. Use static ARP entries.
A. Use ARPWALL.
C. Use private VLANs.
D. Use static ARP entries.
Examine the following Snort rule:
Which of the following are true regarding the rule? (Choose all that apply.)
A. This rule will alert on packets coming from the designated home network.
B. This rule will alert on packets coming from outside the designated home address.
C. This rule will alert on packets designated for any port, from port 23, containing the “admin” string.
D. This rule will alert on packets designated on port 23, from any port, containing the “admin” string.
B. This rule will alert on packets coming from outside the designated home address.
D. This rule will alert on packets designated on port 23, from any port, containing the “admin” string.
You want to begin sniffing, and you have a Windows 7 laptop. You download and install Wireshark but quickly discover your NIC needs to be in “promiscuous mode.” What allows you to put your NIC into promiscuous mode?
A. Installing lmpcap
B. Installing npcap
C. Installing WinPcap
D. Installing libPcap
E. Manipulating the NIC properties through Control Panel | Network and Internet | Change Adapter Settings
C. Installing WinPcap
A network and security administrator installs an NIDS. After a few weeks, a successful intrusion into the network occurs and a check of the NIDS during the timeframe of the attack shows no alerts. An investigation shows the NIDS was not configured correctly and therefore did not trigger on what should have been attack alert signatures. Which of the following best describes the actions of the NIDS?
A. False positives
B. False negatives
C. True positives
D. True negatives
B. False negatives
A pen test member has gained access to an open switch port. He configures his NIC for promiscuous mode and sets up a sniffer, plugging his laptop directly into the switch port. He watches traffic as it arrives at the system, looking for specific information to possibly use later. What type of sniffing is being practiced?
A. Active
B. Promiscuous
C. Blind
D. Passive
E. Session
D. Passive
Which of the following are the best preventive measures to take against DHCP starvation attacks? (Choose two.)
A. Block all UDP port 67 and 68 traffic.
B. Enable DHCP snooping on the switch.
C. Use port security on the switch.
D. Configure DHCP filters on the switch.
B. Enable DHCP snooping on the switch.
C. Use port security on the switch.
What does this line from the Snort configuration file indicate?
var RULE_PATH c:\etc\snort\rules
A. The configuration variable is not in the proper syntax.
B. It instructs the Snort engine to write rule violations in this location.
C. It instructs the Snort engine to compare packets to the rule set named “rules.”
D. It defines the location of the Snort rules.
D. It defines the location of the Snort rules.