section 4.1 Flashcards

1
Q

Used to determine the route a packet takes to a destination

  • Will map the entire path
  • Time in TTL (Time To Live) is in hops
A

traceroute (POSIX)

tracert (Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lookup names and IP addresses

- If deprecated use dig instead

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • More advanced domain information

- Does the same as nslookup just more advanced than nslookup

A

dig or DIG

- Domain Information Groper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Helps determine TCP/IP and network adapter information

  • additional IP details
  • ping your IP address
A

ipconfig for Windows

ifconfig for Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Nmap abilities and give a description of each of them.

A
Network mapper
- Find and learn more about network devices
Port scan
- Find devices and identify open ports
OS scan
- Discover the OS w/o loggin in to a device
Service scan
- What service is available on a device
NMAP scripting
- external capabilities, vulnerabulites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • What command test reach ability, determines round-trip time
  • Uses Internet Control Message Protocal (ICMP)
A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the command that combines ping and traceroute and also describe the steps of the process and what happens in each step

A

pathping

First: run traceroute
- Build a map
Second: run ping
- Measure round trip time and packet loss at each hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This command is a TCP/IP packet assembler/ analyzer
Sends crafted frames
- Modify all IP, TCP, UDP, and ICMP values

A

hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network command to show all active connections.

A

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network command shows binaries

A

netstat -b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network command to not resolve names on the network

A

netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This command allows you to read and write to the network.

List some functions that this command can do

A
netcat
- Listen on a port number
- Transfer data
- Scan ports and send data to a port
Go as far as to run a shell from a remote device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This network scanner will search a network for IP addresses

  • Locate active devices
  • Avoids doing work on an IP address that is not there
A

IP scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List some IP scanner techniques

A

ARP
ICMP
TCP ACK
ICMP timestamp requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call a determination of a MAC address bases on an IP address

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

arp -a command

A

Lets the user view local ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Purpose of the route command

A

View the device’s routing table
-Find out which way the packets will go
Windows command: route print
Linux & macOS: netstat -r

18
Q

What is the curl command

A

Client URL

  • Retrieve data using a URL
  • Uniform Resources Locator
  • Grab the raw data
19
Q

Name some functions of the theHarvester command

A
  • Gather OSINT
  • Scrape information from Google or Bing
  • Find PGP keys by email domain
  • DNS bruteforce
    • Find those unknown hosts, vpn, chat, mail, partner, and etc.
20
Q

List some functions of the sniper command

A
  • Combine many recons tools into a single framework
    • dnesum, metasploit, nmap, theHarvester
  • Both intrusive and non-intrusive scanning options
  • Another tool that can cause problems
    ex. Brute force and server scanning
21
Q

What does the dnesum command do?

A
  • Enumerate DNS information: find host names
  • View host information from DNS servers
  • Find host names in Google
22
Q

What is Nessus

A
  • Industry leader in vulnerability scanning
  • Identify known vulnerabilities
  • Extensive reporting
    • a checklist of issues
    • filter out false positives
23
Q

What is Cuckoo

A
  • a sandbox for malware
  • a virtualized environment
  • a track and trace
    • API calls, network traffic, memory analysis
    • Traffic captures
    • Screenshots
24
Q

This is a file manipulation to view the first part of the file

A

head [option] [file]

25
Q

This File manipulation tool allows you to view the bottom of the file

A

tail [option] [file]

26
Q

What does the cat command do?

A

Concatenate

  • copy a file/files to the screen
    ex: cat file.txt file2.txt
  • copy a file/files to another file
    ex: cat file1.txt file2.txt > both.txt
27
Q

What does grep do?

A

Find text in a file

grep PATTERN [FILE]

28
Q

What is the chmod command. What are some options to set permissions and modes

A
  • Change mode of a file system object
  • Also use octal notation
    ex. 7 4 4
  • r = read, w = write, x = execute
  • Setting permissions:
    file owner: u
    the group: g
    others: o
    all: a
29
Q

What does the logger command do?

A
  • Add entries to the system log
    • syslog
  • Adding to the local syslog file
30
Q

What is Toreplay? What does it do?

A

a suite of packet replay utilities
Test security devices

Test and tune IP Flow/NetFlow devices
Evaluate the performance of security devices

31
Q

This command captures packets from the command line

A

tcpdump

32
Q

Name this graphical packet analyzer. Also, name some other functions

A

Wireshark
Gathers frames on the network
Extensively decodes
- View the application traffic

33
Q

This is a reference to the DD command. What does it do?

A

dd
create a bit-by-bit copy of a drive
create a disk image
restore from an image

34
Q

What does memdump do?

A

Copy information in system memory to the standard output stream
Copy to another host across the network

35
Q

What is Winhex?

A

Universal hexadecimal editor for Window OS

  • Edit disks, files, RAM
  • Disk cloning
  • Secure wipe
36
Q

What does FTK imager do?

A

AccessData forensic drive imaging tool

  • includes file utilites and read-only image mounting
  • Windows executable
37
Q

What does Autopsy do?

A

Perform digital forensics of hard drives, smartphones
- View and recover data from storage devices

Extract many different data types:

  • Downloaded files
  • Brows history and cache
  • Email messages
38
Q

Exploitation frameworks

A
pre-built toolkit for exploitations
- Build custom attacks
metasploit
- attack known vulnerabilities
The Social-Engineer Toolkit (SET)
- Spear phishing, infectious media generator
39
Q

Password Crackers

A
Find the passwords
online cracking
- Try username/password combinations
offline cracking
- Brute force a hash file
40
Q

Data sanitization

A

Completely remove data
Many different use cases
A one-way trip
- permanent