14B: Use Remote Access Tools Flashcards

3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

Application protocol supporting secure tunneling and remote terminal emulation and file copy; runs over TCP port 22.

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An older remote protocol that does not support encryption and is disabled on most modern systems. However, some older or insecure systems may still have this service enabled (tcp 23)

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Linux command that is similar to Telnet, but if the server has an .rhosts file configured a certain way, you won’t even need to supply credentials.

A

rsh/rlogin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command-line utility used to read from or write to TCP, UDP, or Unix domain socket network connections.Highly versatile but does not use encryption.

A

netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tool developed for Nmap as an improvement over Netcat, not only retaining most of the functionality, but also adding more, of which an important one is support for SSL.

A

ncat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly