Real Practice Flashcards

1
Q

Light scan

A

nmap IP –top-ports 10 –open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSH port

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP Port

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Heavy Scan

A

nmap IP -p- -sV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to check version of ssh remotely by netcat?

A

nc -nv IP 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to check up headers from the web server?

A

curl -i IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to get robots.txt from web server?

A

curl IP/robots.txt -s | html2text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vulnerability

A

A vulnerability is flaw in a system which COULD provide an attacker with a way into the software itself, in a
unattended manner.
It is not an open door, but a weak door, which MIGHT allow an attacker a way in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

exploit

A

A exploit is the way INTO the system. An attacker turns the vulnerability into a method into the system.
An exploit is the tool used to bust down the door - allowing the attacker to walk through the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

0day

A

0day means the exploit has been known about for less than a day. So the software authors didn’t have any
notice/chance to create a patch, to protect from the vulnerability.
Someone has found a way to bust down a door without giving the chance to put up any protections,
stopping the attack from happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1day

A

1day means the vulnerability is publicly known about, allowing for the software authors to create a patch. However,
there isn’t yet any public exploit code.
Able to protect a door from being busted down even though there isn’t yet a known way to open the
door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CVE

A

CVE is a standard, for making a list of vulnerabilities, using a certain naming format and terms. It makes it easier to
identity and reference vulnerabilities.
Able to identity what the issue is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Feature

A

A “feature” is using the software how it was designed in order to perform an action
Such as allowing file uploads on a web site, to share pictures, might also allow for web shells to be
uploaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly