06- Footprinting Flashcards
(52 cards)
active fingerprinting
specially crafted packets are sent to the operating system get a response
Application
Is designed for end user operation. It is a program or collection of programs that provides users with access to word processors, Web browsers, picture viewer, etc.
Attack
occurs when a system is compromised based on a vulnerability by an unknown exploit
banner grabbing
can reveal compromising information about the operating system and the services that are running on the system; works by using Telnet or a proprietary program
BiLE
stands for Bi?directional Link Extractor; includes a couple of Perl scripts used in enumeration processes
DNS footprinting
allows you to obtain information about DNS zone data
DNS zone data
includes DNS domain names, computer names, IP addresses, and more information about the network
DNSstuff
DNS interrogation tool; extracts DNS information about IP addresses, mail server extensions, DNS lookups, WHOIS lookups, etc.
Enumeration
the first attack on a target network; the process to gather the information about a target machine by actively connecting to it
Ethical Hacking
testing the resources for a good cause and for the betterment of technology; another term for ?penetration testing.?
Exploit
written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
Firewall
Is a security system consisting of a combination of hardware and software which limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the Internet. It is a tool that provides security to a network against unauthorized access from the Internet or other outside networks
footprinting
the first step in hacking; the process of collecting information about a target network and its environment
A popular search engine
Google hacking
refers to creating complex search engine queries; An attacker can try to find websites that are vulnerable to exploits and vulnerabilities
Google Hacks
a compilation of carefully crafted Google searches that expose novel functionality from Google’s search and map services
Goolink Scanner
removes the cache from your searches, and collects and displays only vulnerable site’s links
Gooscan
a tool that automates queries against Google search appliances
Hackers for Charity
a group of technologists who have sourced their information from various sources and maintain a GHDB
Hacking
a loaded term that in some ways defies definition. Very simply, it is an intrusion upon a system. In some cases, as with Certified Ethical Hackers, this intrusion is solicited for the purposes of defining and ultimately resolving network vulnerabilities. Still, in others, hacking denotes unauthorized access. In some cases, the term “hacker” is used synonymously with “programmer”
Initial information gathering
Gathering information available in the outside world about any organization
Intrusion Detection System (IDS)
Can either be implemented as hardware or software and is responsible for monitoring a network and defining various activities as either valid, allowed activities or malicious activities, all based on predefined rules
Intrusion Prevention System (IPS)
an active IDS; the next level of security technology with its capability to provide security at all system levels from the operating system kernel to network data packets
IP addresses
used to find the machines in a network