Attack Phase: Penetrating the Perimeter Flashcards

1
Q

Methods used to test firewalls:

A
  • ICMP probes
  • Checking access Control
  • Evaluating protocol filtering rules
  • Evaluating IDS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Methods used to enumerate devices:

Enumerate definition: to specify the exact quantity of

A
  • Device ID
  • Hostnames
  • Physical locations
  • IP and mac addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

General notes:

A
  • You can find out the manufacturer of a device through it’s mac address (but not the model of the device. You would need the data telling which mac addresses are linked to which model of device that generally only the manufacturer has access to).
  • When you find out the manufacturer of a device, you can generally find out which type of OS that device would most likely have, given that most manufactures stick to a single OS.
  • You also might be able to find any known vulnerabilities that the manufacturer’s devices are subject to.
  • You can make conclusions based on which sorts of things the firewall does and does not react to, and in which ways
How well did you know this?
1
Not at all
2
3
4
5
Perfectly