Tools/Systems/Programs Flashcards
What are the two detection methods used by IDS systems?
Signature-based and anomaly-based
What is the purpose of the web site archive.org?
This Web site is an Internet archiving site that maintains archives of Web sites over many years
Which Nmap switch performs a normal connect scan?
-sT
Which Nmap switch performs a normal stealth scan?
-sS
Which Nmap switch performs an inverse Xmas scan?
-sX
Which Nmap switch performs a ping scan?
-sP
Which Nmap switch includes protocols in the output?
-sO
In which phase of an attack does information gathering, physical and social engineering, and locating network ranges occur?
Reconnaissance
In which phase of an attack does discovery of live hosts, access points, accounts and policies, and vulnerability assessment occur?
Scanning/Enumeration
In which phase of an attack are the systems breeched, malicious code planted and backdoors opened?
Gaining Access
In which phase of an attack are rootkits installed and unpatched systems taken advantage?
Maintaining Access
In which phase of an attack is the record of the attack wiped or obscured?
Clearing Tracks
What would you use the tool ADMutate for?
To disguise the attack signature for the purpose of evading a signature based IDS
What is the data payload called when ADMutate is in use?
An egg
What type of tool is Mole?
An automatic SQL Injection exploitation tool