SEC CONCEPTS Flashcards

1
Q

________ exist to connect devices on a network by using packet switching to receive and forward data to the destination device.

When exploited, ________ are able to be manipulated and configured in a way that allows for network packet sniffing

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an open-source collection of tools for network auditing and penetration testing (hacking into a network), and is one of many tools that can be used to sniff network traffic and passwords.

A

Dsniff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a utility within the Dsniff collection, that is capable of conducting an attack known as Mac Flooding

A

Macof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is an attack that attempts to overload a switch by sending the targeted switch network traffic with different source MAC addresses.

A

MAC flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When the target switch receives a new frame with an unknown MAC, the switch will add it into its?

A

MAC Address Table (MAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the switch receives thousands of theses new MAC addresses, ______________________________________________________________. The switch no longer is able to keep track of where these devices are and will then begin sending traffic to every interface that is on the switch, reducing the switch to a hub.

A

eventually the MAT will become filled and will not be able to add any more additional devices, and then can not start directing individual frames anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This enables an attacker to utilize a packet analyzer to easily capture packets and see anything on the network. During a MAC Attack can also shut down entirely, this is known as fail-open repeating mode and is a type of Denial-of-Service.

A

Mac Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a type of exploit at the switch that consists of compromising the ARP table by manipulating the MAC addresses so that IP addresses will point to another machine.

A

ARP Poisoning (aka ARP Spoofing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP Poisoning (aka ARP Spoofing) is considered to be a type of ___________ attack where the ARP cache is poisoned and all packets are sent to the access point.

A

Man-In-The-Middle(MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(True or False) ARP Spoofing can be considered a Man-In-Middle Attack?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of attack attempts to overload the MAT on a switch?

A

MAC Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

provides a great amount of detailed information about the target router and situational awareness surrounding the target router and its environment.

A

Router reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The scanning methods that are used to _________ routers, are the same methods that are used to enumerate any host target. IP addresses are scanned to identify available ports and services. Banner grabbing can also be used to identify the service version of ports that have been discovered

A

enumerate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is an application layer protocol that runs on UDP and is utilized to manage network devices that run on the IP Layer (i.e. Routers)

A

SNMP or Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SNMP passwords

A
  • Read community strings are public and the device configuration of the device can be viewed with this password.
  • Read/Write community strings are private. The device configuration is able to be modified with this password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____________ is a virtual hierarchical database that is used by SNMP to internal manage network objects. SNMP passwords can be used to view and/or modify network objects.

A

Management Information Database (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____________ is an SNMP application that utilizes multiple GETNEXT requests, in order to search for and obtain SNMP data. It can be used as an enumeration tool gather to information that specifically pertains to routers. When port 161 (SNMP) is open and has a valid community string, router information is easily searchable

A

SNMPwalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Router and SNMP enumeration can lead to the following:

A
  • Network resource information (Routers, devices, share drives, etc)
  • ARP and routing tables
  • Traffic Statistics
  • Network addressing topologies
  • Information about network owner and location of the routing device
  • Identify potential targets on network
  • Routing policies and rules
  • Implemented Security levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What application can be used for router enumeration?

A

SNMPwalk

20
Q

(True or False) Port 161 can provide router information?

A

True

21
Q

____________ of the router are controlled by logging statements. These logging statements identify the IP address of the host that is storing the logs. Exploiting the host can also provide the attacker with the ability to enable log cleaning. This can be very beneficial when an attacker attempts to cover some of their tracks.

A

Remote Logging capabilities

22
Q

_____________ is an application that is a penetration testing tool, that is used to exploit and identify various devices based on a large number of known routers. Router Scan collects critical information on wireless networks (and WANS), like wireless network characteristics, encryption types, model of router, SSIDs and access point key passphrases

A

Router Scan

23
Q

Router Scan gathers information using two main methods

A
  • Guessing a username/password pair to gain access to the router.
  • Exploiting vulnerabilities that exist on specific router models, obtaining target information and possibly bypassing authorization procedures.
24
Q

is an open source exploitation framework designed to primarily detect and exploit router vulnerabilities.

A

RouterSploit

25
Q

Router Scan vs RouterSploit

A
  • RouterSploit utilizes a CLI instead of a GUI, and requires goals to be manually set and does not all for a set subnet, all targeted routers must be individually specified.
  • RouterSploit has more exploits than RouterScan and is more robust. It also supports the ability to brute force multiple network services.
26
Q

Exploiting a router can enable allow the attacker to cover their tracks by cleaning what?

A

logs

27
Q

What CLI based tool can be used for the purposes of router exploitation?

A

RouterSploit

28
Q

__________ is an information gathering method, where an attacker gathers pertinent information about a target router.
Router configuration files are often a prime target for information gathering operations.

A

Router Collection

29
Q

Cisco Routers utilize two main copies of configuration files

A

startup and running configurations

30
Q

___________ is a persistent copy of Cisco Router Configurations and is typically stored in the NVRAM; the contents are retained after reboot. The Startup configuration is also the configuration that is ran when the device is booted up

A

Startup configuration file or “Startup config”

31
Q

_____________________ are where the router stores configuration changes while the router is running. The run config file is NOT persistent, this means that changes that are made to the run config file, while the router is running, are NOT retained after reboot. The run config file can be saved to either NVRAM or a TFTP (Trivial File Transfer Protocol) server if a TFTP server exists on the network.

A

Running Configuration Files or “Running config”

32
Q

Are Startup Configuration files considered to be persistent or non-persistent?

A

Persistent

33
Q

(True or False) Router configuration files are prime targets when conducting router collection?

A

True

34
Q

The main goal of any firewall is to prevent uninitiated traffic from entering the network. Because firewalls protect the network by filtering or limiting the traffic between trusted and untrusted networks _______________ is an important aspect of the attack plan when planning to attack any target network

A

firewall enumeration

35
Q

can be used to identify and confirm that a firewall is on the network, while port scanning and banner grabbing can identify vendor specific information

A

A simple traceroute

36
Q

Traceroutes are often employed as a means to identify firewalls and other packet filtering devices on a target network, as well as the hosts that it protects, which sit behind it. When _________are present when the results of a traceroute are returned, it may likely represent a firewall, packet filtering device or may be severe network latency.

A

asterisks(*)

37
Q

is an active reconnaissance process, utilizing the Firewalk tool,

A

Fire walking (the using)

38
Q

A tool, which allows an attacker to gain a better understanding as to what protocols a firewall will allow.

A

Firewalk

39
Q
  • This method will determine the movement of a packet from a untrusted source and to a protected host through the firewall.
  • There are two main uses for fire walking, identifying and enumerating hosts that live within the protected network, and identifying ports that are accessible through the firewall.
A

Firewalk

40
Q

The _________ tool conducts the process of fire walking by using a technique based off of a traceroute and TTL values. The Fire Walk tool will send out TCP or UDP packets that have one hop greater than that of the gateway.

A

Firewalk

41
Q

Firewalk: If the gateway allows the packet the traffic to pass it will then forward to the next hop, where it then expires and presents a _____________ error message

A

ICMP_TIME_EXCEEDED

42
Q

___________ will raise the hop counts in an attempt to obtain the right IP TTL that will allow a packet to expire one hop behind the gateway. Once this process is completed and Fire Walk correctly identifies the hop of the gateway it will then start scanning

A

Fire Walk

43
Q

What tool uses a technique that is similar to traceroutes, in order to identify hosts that sit beyond a firewall?

A

fire walk

44
Q

(True or False) The ping scan (-sP) to return filtered ports?

A

false

TCP SYN Stealth Scan(-sS) or a TCP Connect Scan(-sT) will do this

45
Q
A