T1 Flashcards

1
Q

What is an “exposed attack surface”

A

Parts of a system or device that can be accessed or attacked over a network, such as open ports, services or protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of Nmap?

A

Nmap is a network scanning tool used to discover hosts, open ports, and vulnerabilities on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the command to perform network discovery using ICMP in Nmap?

A

sudo nmap -sn -v 192.168.0.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do attackers prefer ICMP scans ove TCP/UDP probes?

A

Less intrusive and more likely to bypass firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you perform a network discovery using TCP SYN packets to find active devices on the network?

A

sudo nmap -sS -v 192.168.0.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Netdiscover, and how is it different from Nmap?

A

A passive network discovey tool that listens for traffic, while Nmap actively probes devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the command for passive discovey with Netdiscover?

A

sudo netdiscove -i < network_device > -p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of port scanning in Nmap?

A

To find services running on a device by identifying open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the command sudo map -sT < ip_host_address > do?

A

Scans the host using the TCP protocol to find open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the command sudo nmap -sU < ip_host_address > do?

A

Scans the host using the UDP protocol to find open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of sudo nmap -O < ip_host_address >?

A

It performs a scan using default scripts to find detailed service information and potential vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of the Nmap “vuln” script?

A

Detects known vulnerabilities in the services running on the target host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Nikto, and what does it do?

A

Nikto is a web server scanner that identifies vulnerabilities and misconfigurations in HTTP/HTTPS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you use Nikto to scan a web server on HTTP?

A

nikto -h < ip_host_address >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command to perform a brute-force attack on an SSH service using Nmap?

A

nmap -p 22 –script ssh-brute -v < ip_host_address >

16
Q

What is privilege escalation?

A

The process of gaining higher privileges (e.g., admin/root access) on a system by exploiting weak passwords, vulnerabilities, or misconfigurations.

17
Q

What tool can be used to identify local vulnerabilities for privilege escalation?

A

Lynis

lynis audit system

18
Q

What are some common scanning parameters in Nmap?

A
  • -sT: TCP connect scan.
  • -sU: UDP scan.
  • -O: Detect operating system.
  • -sV: Detect service versions.
19
Q

How many ports are typically scanned by Nmap by default?

A

1,000 commonly used ports. To scan all 65,535 ports, use:

20
Q

What is the difference between active and passive scanning?

A

Active Scanning: Sends packets to devices to elicit responses (e.g., Nmap).
Passive Scanning: Observes network traffic without sending packets (e.g., Netdiscover).