Scanning Networks Flashcards

1
Q

What is metasploit

A

Metasploit is an open source project that provides the infrastructure, content and tools to perform penetration test and exensive security suditing. IT provides information about security vulnerablilities and aids in penetration testing and IDS signature development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What techniques can be used to evade firewalls?

A

Packet fragmentation
Source routing
Source port manipulation
Ip Address Decoy
Ip address spoofing
Mac Address spoofing
Creating custom packets
Randomizing host order
Sending bad checksums
Proxy servers
Anonymizers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the hping3 -A 10.0.0.25-p 80 command do?

A

Hping3 is a command line oriented network scanning and packet crafting tool for the tcpIP protocol that sends icmp echo requrest and supports tcp, udp, icmp and raw ip protocols
The full comand will do an ACK scan (-A) on port 80 (-p 80) this is to check if there is a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is banner grabbing?

A

Banner grabbing or OS Fingerprinting is a method used to determine the OS that is running on a remote target system. IT is an important scanning method as the attacker will ahve a higher probability of success if the OS of the target system is known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of banner grabbing are there?

A

Active banner grabbing: Use speially crafted TCP packets to check an OS
Passive baner Grabbing: runs on the same premis as Active but it checks out going packets with a sniffer to study the os

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the -sS nmap switch and what does it do?

A

SYN Half-open scan
Stealth scan
Perform a TCP SYN scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the -sV nmap switch and what does it do?

A

Service version discovery
Probe open ports to determine service/version info.
Some version of the protocols are insecure and they can allow attackers to compromise the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the -O nmap switch and what does it do?

A

Os discovery. Nmap is an effective tool for performing os discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the -sn nmap switch and what does it do?

A

sn is the Nmap command to disable the port scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the -PM nmap switch and what does it do?

A

ICMP address mask ping scan this is where the attackers send an icmp address maks query to the target host ot acquire information related to the subnet mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three type os scanning.

A

Ports scanning
Network scanning
Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain port scanning

A

Lists the open ports and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain network scanning

A

Lists active hosts and IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerablility scanning

A

SHows the presence of know weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the different forms of TCP scanning?

A

Open TCP Scanning methods: Tcp connect/ full open scan
Stealth TCP scanning methods: Half open scan, INverse tcp flag scan, xmas, fin, null, maimon
Ack flog probe scan: TTl based, window based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an echo ping sweep?

A

A ping sweep is a basic netowrk scanning technique that is adopted to determine the range of IP addresses that map to live hosts.

17
Q

What are TCP communication flags?

A

They control the transmission the transmission of data across a tcp connection. There are six tcp control flags.

18
Q

What are the four flags tha govern the astablishment, maintenance and termination of a connection?

A

SYN, ACK, FIn and RST.

19
Q

What are the two flag that provide instructions to the system.

A

PSH and URG

20
Q

What is Zenmap?

A

It is the official, free and open source gui for nmap.

21
Q

What does the nmap -6 -O 192.168.3.56 command do?

A

It will scan the target ip address using IPV6 to identify the operating system.

22
Q

What is the Xmas scan?

A

It is a scan that uses the FIN, URG and PUSH flags to send a tcp frame to a remote device. IF the raget has opened the port then you will receive no response from the remote system.