Search Skills Flashcards
What do we consider when evaluating information ?
Source, Evidence & Reasoning, Objectivity & Bias, Corroboration & Consistency
Name of Fraudulent Cryptographic method or product ?
Snake Oil
What is the name of the command replacing netstat in Linux systems?
Socket Statistics or SS
Name Google search operators and their functions
- ” “ exact phrase
- site: restrict to a domain
- exclude a phrase
- filetype: on google has : pdf, xls, doc, ppt
What are different specific search engines ?
Shodan, Censys, VirusTotal, Have i been pwned
What does Shodan let us do ?
search for specific server types and versions, networking equipment, industrial control systems, IoT devices
What does Censys let us do ?
Search for internet-connected hosts, certificates, websites, assets. Used for domain enumeration.
What does HIBP mean and what does it do ?
Have i been pawned , shows if an email address was compromised after a data breach
What is the top country with lighttpd servers?
United states
What does CVE stand for ?
Common vulnerability and exposures
Exploit Database does what ?
Gives us exploit codes