Protocols Flashcards

1
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UDP

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

nc

A

The Netcat (nc) command is a command-line utility for reading and writing data between two computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

nc -l

A

nc in listening mode (-l flag)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

nc -n

A

The -n flag means to disable DNS or service lookups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Netcat

A

Is a simple yet powerful networking command-line tool used for performing any operation in Linux related to TCP, UDP, or UNIX-domain sockets. Netcat can be used for port scanning, port redirection, and as a port listener (for incoming connections); it can also be used to open remote connections and so many other things. Besides, you can use it as a backdoor to gain access to a target server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The lack of what means that all Telnet communication is in plaintext?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What communications model does FTP use?

A

client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the standard FTP port?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NFS

A

Network File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RPC

A

Remote Procedure Call (RPC) that answers a client request to mount a file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Daemon

A

computer program that runs as a background process, rather than being under the direct control of an interactive user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Enumeration?

A

Enumeration is defined as “a process which establishes an active connection to the target hosts to discover potential attack vectors in the system, and the same can be used for further exploitation of the system.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NFS-Common

A

It is important to have this package installed on any machine that uses NFS, either as client or server. It includes programs such as: lockd, statd, showmount, nfsstat, gssd, idmapd and mount.nfs. Primarily, we are concerned with “showmount” and “mount.nfs” as these are going to be most useful to us when it comes to extracting information from the NFS share.

17
Q

What does NFS stand for?

A

Network File System

18
Q

What protocol does NFS use to communicate between the server and client?

A

RPC Remote Procedure Call is a software communication protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network’s details.

19
Q

URL

A

Uniform Resource Locator

20
Q

HTTP

A

Hyper Text Transfer Protocol

21
Q

HTTPS

A

Hyper Text Transfer Protocol Secure

22
Q

Plaintext

A

Data before encryption or hashing, often text but not always as it could be a photograph or other file instead.

23
Q

Encoding

A

This is NOT a form of encryption, just a form of data representation like base64 or hexadecimal. Immediately reversible.

24
Q

Hash

A

A hash is the output of a hash function. Hashing can also be used as a verb, “to hash”, meaning to produce the hash value of some data.

25
Q

Brute force

A

Attacking cryptography by trying every different password or every different key

26
Q

Cryptanalysis

A

Attacking cryptography by finding a weakness in the underlying math.

27
Q

What is Caching?

A

In computing, a cache is a high-speed data storage layer which stores a subset of data, typically transient in nature, so that future requests for that data are served up faster than is possible by accessing the data’s primary storage location. Caching allows you to efficiently reuse previously retrieved or computed data.

28
Q

Cookies

A

Computer cookies are small files, often including unique identifiers that web servers send to browsers. These cookies then can be sent back to the server each time your browser requests a new page. It’s a way for a website to remember you, your preferences, and your habits online.

29
Q

What is SMTP?

A

SMTP stands for “Simple Mail Transfer Protocol”. It is utilized to handle the sending of emails. In order to support email services, a protocol pair is required, comprising SMTP and POP/IMAP. Together they allow the user to send outgoing mail and retrieve incoming mail, respectively.

30
Q

What 3 Basic functions does an SMTP server perform?

A
  • It verifies who is sending emails through the SMTP server.
  • It sends the outgoing mail
  • If the outgoing mail can’t be delivered it sends the message back to the sender
31
Q

What does POP stand for?

A

Post Office Protocol

32
Q

What does IMAP stand for?

A

Internet Message Access Protocol