Questions Flashcards
How can you tell a UDP port is closed on a target IP?
Returns ICMP_PORT_UNREACHABLE
What is a socket?
The combination of the IP address of the station and a port number
What is a packet (RFC 1594 definition)
Self contained independent entity of data
Carries sufficient information to be routed from the source to the destination computer without reliance on earlier exchanges between source/destination computer and the transporting network
What is a hash function
One way mathematical function
Can’t calculate input from the result
What does !X mean in trace route output?
Communication administratively prohibited
What is a zone?
A point of delegation in the DNS tree. Contains all the names from a certain point downward except those which are delegated to other zones
How can you tell a TCP port is open on a target IP?
The target returns SYN/ACK
Ports 135 139 and 445 are open. What’s the best guess at the OS
Windows 2000 or later (port 445 is 2k+)
What do some firewalls try to limit by enforcing rules on how long get and post requests can be
Buffer overflow attacks
What happens if you digitally sign and inject a footer on an email message in the wrong order
The footer will invalidate the signature
Does the sasser worm only attack hosts running the MSSQL server
No
MS04-011
Starts an FTP server
Generates a list of IP addresses to target based on the hosts IP addresses
Modifies the registry so it runs on system startup
What malware exploits XSS vulnerability and was developed to propagate over MySpace?
Samy
What RPC program number represents ttdbserverd
100083
What weak reversible cipher can be used by Cisco routers to encrypt passwords?
Type 7
What is RIPv1 authentication method
Does not support authentication of messages
Routing information protocol
Allowed via insecure plaintext password or an MD5 hash for version 2
Key size for DES
56
IPSec 4 main attribute classes
Encryption algorithm
Hash algorithm
Authentication method
Diffie-Hellman group
What is click jacking
An attacker tricks a user into performing actions on a website by hiding clickable elements in an invisible iframe
What command displays the group membership for the current user, type of account, SID and attributes?
Whoami /groups
Http status code 407
Proxy authentication required
WEP uses a integrity check value (ICV) what attack would an attack be trying to achieve submitting a packet without an ICV
It will allow the attacker to derive the key stream
SSH server version 1.99 supports which versions of SSH
Versions 1 and 2
What is 0x0100 in an sql server password?
Padding, the salt value is placed after this padding
RPORT 10,2,0,2,10,10
10.2.0.2 is the IP address of the client
10,10 must be converted to hex then to binary then to decimal to get the TCP port number
RealVNC 4.1.1 is vulnerable to what attack
Type 1 authentication can be specified to disable authentication
How many secret bits in a 128 bit WEP key
104
TCP ports 135 and 139 open on a server. What’s the best guess at the OS
Windows NT 4 or later
ArcServe 5.11 is vulnerable to which attack
Stack based buffer overflow causing custom code to run in the processes current context
What ports must be open on a firewall to allow IKE VPN to function
UDP 500, protocol 50 & 51
What responds to an nap fin scan -sF with FIN/ACK
Solaris
AIX
HPUX
Linux
SNMP MIB 55 and 53 meaning
53 copies from router to the server (to the device)
55 from the server to the router (from the device)