CEH Flashcards
(174 cards)
What is the nmap parameter for aggressive scanning?
-A
What is the nmap parameter for enabling the script engine?
-sC
What is the nmap parameter used for OS fingerprinting?
-O
What is the nmap parameter used to identify the path taken by a packet as it travels toward the destination?
–traceroute
What nmap parameter is used to disable ICMP pings?
- P0 or -PN (old)
- Pn (new)
What nmap parameter configures nmap to perform a stealth scan, also known as a SYN scan or half-open scan?
-sS
What nmap parameter configures nmap to disable DNS?
-n
What nmap parameter configures nmap to always perform DNS?
-R
What nmap command is equivalent to nmap -A?
nmap -sV -sC -O –traceroute
What is JXplorer?
Java-based LDAP browser
What is Luma?
Python-based LDAP browser
What is Coral Directory?
LDAP browser specific to Windows 2000 or later
What are Cloudborne attacks?
How can they be mitigated?
firmware backdoor is installed on cloud server that is later repurposed for another client
Reflash the firmware on a server before repurposing it
What was Operation Cloud Hopper?
Spear phishing was used to infiltrate cloud provider networks, enabling attackers to compromise target data stored in the cloud
Which MIB stores information about TCP/IP on network hosts as well as information about SNMP configuration itself?
MIB_II
Which MIB contains information about the network traffic between hosts and DHCP servers?
DHCP.MIB
Which MIB contains information about workstation and server services?
LMMIB2.MIB
Which MIB contains information the windows internet name service, a name resolution service for NetBIOS?
WINS.MIB
Which MIB contains information about managing and monitoring resources on hosts on the network, such as host’s date and time, users, processes, memory, physical storage, etc.?
HOSTMIB.MIB
What is KoreK chopchop?
An attack that can decrypt a WEP packet without requiring the key
What is KRACK?
Key Reinstallation Attack. Replay attack that exploits WPA2’s four-way handshake process.
The attacker captures the shared secret and tricks the victim into reinstalling a key that is already in use.
What type of information is included in a WHOIS query?
information about the IP network range from which the IP address was allocated
technical, administrative, and billing contact information for the parties associated with a particular domain name
Which DNS records contain information about the OSs implemented and the hardware platforms in an organization?
HINFO
Which nmap parameter configures nmap to perform an ACK scan?
-sA