SCANS Flashcards

1
Q

heavily enable reconnaissance, and information gathering. This intelligence can reveal vulnerabilities that cyber threat attackers can exploit and use as attack surfaces

A

Scanning and enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the process of collecting information without performing any analysis to identify a host, or obtain more details on a host.

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is performing cursory analysis on the data collected from scanning to identify one or more hosts, or gathering more information on a host to discover additional details on the target. The goal of _______ is to establish a numeric understanding of the target and enables the identification and collection of important information about the target

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Successful enumeration and scanning can reveal possible ___________ and provide insight on the vulnerabilities that our targets attack surfaces are exposed to.

A

Attack Surfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are the set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or extract data from.

A

Attack surfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is any weakness that exists within a targets device, software and/or network that can be exploited in order to deliver a payload and cause harm to the target.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Characteristics of scanning and enumeration: is the recording, aka sniffing, and analysis of packet streams to determine hosts and network characteristics

A

Passive fingerprinting

  • Passive collections will leave little to no evidence of the scans being performed by not interacting with host machines on the network.
  • This technique avoids the 4 D’s (deny, degrade, destroy, disrupting) to the network and host machines, and prevents alerts from occurring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Characteristics of scanning and enumeration: are a grouping of information that can be used to identify the software, network protocols, operating systems and the hardware that may be in use on a network

A

Fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What process focuses on establishing a numerical understanding to collected information pertaining to a target network?

A

enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the process of collecting information without performing any analysis to identify or obtain more details on a host?

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the process of sending normal or malformed packets to a target, and monitoring it’s response.

involve interaction with network machines, which may alert users on the network through logs, alerts, or artifacts left behind.

A

Active fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Analyzing the target’s response may help fingerprint the target and determine the security measures that may have been placed. Pertaining to port scanning, 1 of 3 responses will be received:

A
  • Open, Accepted – host responds and awaits further instructions
  • Closed, Not Listening – port currently in use and unavailable
  • Filtered, Dropped, Blocked – host does not respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

involve interaction with network machines, which may alert users on the network through logs, alerts, or artifacts left behind.

A

Active scans/fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some Active Fingerprinting tools that an attacker may use to gather information on a target network, include the following:

A
  • NMAP
  • Xprobe2
  • CronOS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What fingerprinting method is considered to be more overt? Active or Passive?

A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What three responses are provided when port scanning?

A
  • open
  • closed
  • filtered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port and Service Identification

A

is part of the fingerprinting process. In the client-server communication relationship, the client has the ability to request one or more services from a server.

18
Q

Port and Service Identification: that are identified when analyzing network traffic between a server and client, can often reveal what services a client may be requesting from a server, and allows the client to know what services the server is sending back to the client

A

port numbers

19
Q

Port and Service Identification: caution

A

Remember, the ports may be set or modified by the administrator. An example of this would be if port 22 (ssh) was changed to port 2222 for security measures

20
Q

Analyzing what, can reveal services that a client is requesting from the server?

A

port numbers

21
Q

True or False: Port numbers are always static

A

false

22
Q

Port and Service Identification

A

These common ports are associated with certain host machines and servers

23
Q

is a tool used to discover live hosts, services, network inventory, managing service upgrade schedules, monitoring host or service uptime, filters/firewalls, or specific operating systems by analyzing the response from the raw IP packets sent to a target system

A

Nmap

24
Q

Angry IP Scanner advantages

A
  • The biggest advantages to Angry IP Scanner is the ease of use and flexibility that it provides to the user as a tool. Angry IP allows for the saving of favorite IP ranges, utilizes an easy to use GUI, uses multi-threaded scanning for faster response times and provides flexibility when exporting results into a CSV, TXT or XML file format.
  • This flexibility is also seen in the open source nature of the tool, which allows for easy customization of the source code, as well as the ability to use additional plug-ins to provide greater information returns.
25
Q

Nmap analyzes the response from what type of packets that are being sent to a target system?

A

TCP, UDP … depends on what you send out

26
Q

Angry IP Scanner:

is powerful tool that is capable of providing a vast array of information about a target; revealing host names, MAC addresses, NetBIOS information (such as the computer name, workgroup name, and currently logged in Windows user), favorite IP ranges, detecting web servers, and more

A

Angry IP Scanner

27
Q

True or False: NMAP is a tool that can identify and fingerprint network hosts and devices from PCAP files captured from ethernet or WiFi data.

A

false

28
Q

Angry IP Scanner: was a legacy command line port scanner dedicated to the Windows OS that utilized ICMP to conduct its scans and targeted all TCP and UDP ports. Today ScanLine no longer exists and the tools we use have a much broader scope and capability.

A

Scanline

29
Q

Angry IP Scanner: was not designed with the sole purpose of being an offensive security tool; it lacks the ability to conduct stealth-scanning methods that other scanning tools are able to utilize.

This means that targeted networks and systems may be able to easily detect scanning if using Angry IP, as opposed to Nmap

A

Angry IP Scanner

30
Q

Angry IP Scanner: is an great GUI based alternative network scanning tool, that is able to function with ease on Windows, Linux and MacOS and provides the ability to quickly scan any range of IPs (as the name suggests), and ports, as well as various other functions.

A

Angry IP Scanner

31
Q

What operating system can Angry IP Scanner run on?

A

any

32
Q

True or False: Angry IP Scanner is a cross-platform scanning tool that can uncover information about a target in an undetectable manner?

A

false

33
Q

Services like FTP servers, web servers, SSH servers and other systems expose confidential information like software names, versions and the OS it is running. All of this information is known as?

A

banner data

34
Q

If an attacker can grab this _________, it could easily lead them to vulnerabilities that they can exploit against their target.

A

banner data

35
Q

Technique banner grabbing: Within banner grabbing, there are two different techniques

A

Active banner grabbing, and Passive banner grabbing

36
Q

is the act of obtaining software banner information, either manually or using tools that perform this function automatically

A

Banner grabbing

37
Q

Technique banner grabbing: is the most widely used method of grabbing banner data.

This is active because the connection is logged in the remote system. This method can often times, be detected by intrusion detection systems, and therefore is much more overt.

A

Active Banner Grabbing

38
Q

Technique banner grabbing: provides nearly as much information, yet is able to avoid the exposure and scrutiny from the origin connection

A

Passive Banner Grabbing

39
Q

The following tools, functions or protocols can be used to perform banner grabbing

A
  • cURL
  • Burp Suite
  • Dmitry
  • Netcraft
  • Netcat
  • Niko
  • Nmap
  • Telnet
  • Wikto
  • Wget
40
Q

What is the act of gathering banner data either manually or through the use of tools?

A

banner grabbing

41
Q

True or False: Banner data consists of services like TP servers, web servers, SSH servers, software names, OS versions and open ports/

A

True