Random Recon/ scan Flashcards

1
Q

Name Packet Crafting tools (npow +2)

A

NetScan, PackEth, Ostinato, WAN Killer, Lan Forge Fire, Colasofts- Packet Builder (has three windows packet list, code builder and hex view) Packet builders can fragment packages to get past IDS’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

netstat -an

A

displays all connections and listening ports with addresses and port numbers in numerical form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

netstat -b

A

when run with admin privileges you can see executable tied to open port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ping sweep tools

A

Nmap, angry ip, Solar Winds Engineer Toolset, Network Ping, OPUtils, Superscan, Advanced IP Scanner, Pinkie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steps in scanning methodology (7)

A
check for live systems
check for open ports
scan beyond IDS
perform banner grabbing
scan for vulnerabilities
draw network map
prepare proxies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hping2 -1 ipaddr

A

hping2 syntax to icmp ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hping2 -2

A

hping3 syntax to set up udp mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-8 eg. hping2 -8 2-80

A

hping3 flag to set scan mode scans ports 2 thru 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

–flood hping2 -S -a -p 22

A

hping3 flag for for flood -send syn flood to port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port scanning tools- regular (3)

A

Nmap, PRTG network Monitor, MegaPing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port scanning- Mobile (fzips)

A

ip scanner, fing, zANTi, PORT droid, Super Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is active OS fingerprinting

A

Sending crafted, non standard packets to remote host and analyzing replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is passive OS fingerprinting

A

Sniffing packets and analyzing TTL, window sizes, Don’t Fragment flags and ToS (Type of Service) fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tools that allow IP spoofing (4) (SHaNK)

A

Nmap, Hping, Scapy, Komodia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is gzapper

A

Clears Google cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability Scanning

A

Running a tool against a target to see what vulnerabilities it may have

17
Q

Where are Windows Passwords stored

A

C:\windows\System 32\config\SAM. Machines that are part of a domain passwords are stored and managed by the domain controller

18
Q

Linux enumeration CMD line tools

A

finger (provides info on the user and host machine), rpcinfo and rpcclient (provide info on the rpc enviornment) and showmount (displays shared directories on the machine.

19
Q

Active banner grabbing

A

send crafted packets to remote systems and comparing responses to determine OS

20
Q

Passive banner grabbing

A

Reading error messages (telnet connect to port 80 or nc and response), sniffing network traffic or looking at page extensions

21
Q

SNMP MIB

A

Management Information Base hold information on devices on a subnet arranged by the OID object identifiers. MIB entries can identify what device is, os, usage stats and even change setting on devices. retrieval of info is a GET request. Change of of config is a SET request. trap (alert) port 162

22
Q

What version of SNMP offers encryption and auth and integrity

A

3

23
Q

What version of ntp offers encryption and auth and integrity

A

3

24
Q

LDAP general info

A

session started by client on port 389. Hierarchical database return queries using BER Basic Encoding Rules. Can retrieve usernames, domain info address telephone, system data etc.

25
Q

LDAP enumeration tools (SJL +2)

A

Softerra, JXplorer, Lex, LDAP Admin, Active Directory Explorer

26
Q

NetScan, PackEth, Ostinato, WAN Killer, Lan Forge Fire, Colasofts- Packet Builder (has three windows packet list, code builder and hex view) Packet builders can fragment packages to get past IDS’s

A

Packet Crafting tools

27
Q

Nmap, angry ip, Solar Winds Engineer Toolset, Network Ping, OPUtils, Superscan, Advanced IP Scanner, Pinkie

A

ping sweep tools NANSOAP

28
Q

Nmap, PRTG network Monitor, MegaPing

A

Port scanning tools- regular (3) (NPM)

29
Q

ip scanner, fing, zANTi, PORT droid, Super Scan

A

Port scanning- Mobile (fzips)

30
Q

Nmap, Hping, Scapy, Komodia

A

Tools that allow IP spoofing (4) (SHaNK)

31
Q

Softerra, JXplorer, Lex, LDAP Admin, Active Directory Explorer

A

LDAP enumeration tools (SJL +2)