Enumeration Flashcards

1
Q

Enumeration extracted information such as:

A
  • network shares
  • network resources
  • routing tables
  • audit and service settings
  • SNMP & DNS details
  • Machine names
  • Users & groups ( and user last log in)
  • Application and banners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumeration techniques are conducted in what type of environment?

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is enumeration?

A

The attacker creates an active connection to a vulnerable system and performs direct queries to gain info about the target

Attacker then uses the info to 1- identify system attack points and 2- perform password attacks, to gain unauthorized acess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

list some services and ports to enumerate

A
TCP port 25: SMTP
TCP port 53: DNS transfer zone 
TCP port 21: FTP
TCP port 23: telenet 
TCP 135 : used by email client to connect to email services (RPC) Remote Procedure Call 
TCP 138: NetBIOS datagram service 
TCP 137: NetBIOS name service 
TCP 139: NetBIOS session service
TCP/UDP 445 SMB (service message block )
UDP 161: SNMP network mangment protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SMB protocol?

A

SIMPLE MESSAGE BLOCK is a microsoft application layer protocol for file and print sharing functions for LAN manger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is NBSS (NetBIOS session service)?

A

is a method to connect two computers for transmitting large messages ( located in session layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is NetBIOS?

A

is a program that allows applications on a different computers to communicate within a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explian what is NetBIOS name and what it is consists of?

A

is a unique 16 ASCII character string used to identify the network devices
first 15 char: device name
the 16th char: service type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attackers use NetBIOS ro obtain what info?

A
  • list of computers that belong to a domain
  • list of shares on the individual hosts (in the network)
  • polices and passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is RPC? and what port?

A

Remote procedure call an interprocess communication mechanism allows a program running on one host to run code on a remote host. uses port 135 tcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What commands can be used for NetBIOS emmunartion?. mention for win and linux

A

Windows:
nbtstat -a [ip]
Linux:
nbtscan [ip]

or
nmblookup -A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what happens when you use firweall rules for port 137?

A

when you use nbtstat or nbtscan it will show that the hst is not uo ( it has been blocked by the firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a NULL session attack?

A

uses vulnerblity in SMB for creating connection, by default they areenabled in windows 2000 and windows NT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why is a null session attack possible?

A

because it uses SMB that has trust for any kind of relationship between devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what command to establish null session? in win and Linux

A

windows: net

net use \[ip]\IPC$ “ “ /u:” “

Linux: smbclient

smbclient -L [ip]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what command used to show ip adress and shares on remote system & to list

A

net view \[ip]

17
Q

what command used to eumnertate SMB shares on both win & linux ?

A

enum4linux -a

use -a option to get all oinfo

18
Q

what is the command used for DNS enumeration? (not nmap)

A

host -t ns [ip]
for name server records
host -t mx
for mail exchange brecords (email servers)
host -t a
a records that tranlate human to ip in IPv4
host -t aaa
same as a records but for IPv6
host -t soa
start of authority that contains 1- primary DNS name 2- serial number and if the serial no for primery is higher than secondary a zone tranfer will be instiated

19
Q

what is the nmap command used for DNS enumartion

A

nmap T4 -p 53 –script dns-brute [target]

20
Q

In SNMP, the default community string for read-only is____ and the default community string for read-write is ____

A

public,private

21
Q

what command is used in SNMP to query network device for tree of information? and what command query info in human friendly format?

A

snmpwalk, snmp-check

22
Q

what command to uses to manilpate snmp info?

23
Q

what are the two types of community strings?

A

1- read only
allow to query network devices and read information. no modfication allowed
2-read write
changes to device are allowed

24
Q

a virtual database contains a formal description of all network objects that can be managed using SNMP is caleed___

A

Management Information base (MIB), it is hierarchal and each managed object is addressed through object identifiers (OID)

25
what is LDAP?
Lightweight Directory Acess Protocol is for acessing and maintaing dirubted directory information sercvies in a heirarlical and logial structure. LDAP provides a central place to store usernames and passord so apps and services uses it to identify users
26
What command is used for LDAP?
``` enum4linux -U -O -U to get userlist -M to get machine list -s to get sharelist -G to get group and member list -P passord policy info see slide 61 for more ```