Footprinting and Reconnaissance Flashcards

(16 cards)

1
Q

What is theHarvester?

A

theHarvester is a tool designed to be used in the early stages of a penetration test. It is used for open source intelligence gathering and helps to determine a company’s external threat landscape on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do attackers use theHarvester

A

Attackers use this tool to perform enumeration on the LinkedIn social networking site to find employees of the target company along with their job titles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Whois?

A

Whois Lookup is a query and response protocol used for querying databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What information can whois find for you?

A

Domain name details
Domain registrar
Contact details of the domain owner
Domain name servers
NetRange
When a domain has been created
Expiry records
REcords last updated
Domain stauts
IP address information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is BuzzSumo?

A

BuzzSumo’s advanced social search engine finds the most shared content for a topi, author or domain. It shows the shared activity across all the major social networks including twitter, facebook, lindkedIn, google plus and pinterest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 types of footprinting?

A

Passive and active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Passive footprinting?

A

Passive footprinting involves gathering information about the target without direct interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Active footprinting?

A

Active footprinting involves gathering information about the target with direct interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is netcraft?

A

Netcraft provides Internet security services including anti-fraud and anti phishing services, application testing and PCI scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are common commands used for google dorks?

A

Go to slide 89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What information can be obtained from footprinting?

A

Organization infromation
Network Infromation
System Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Shodan?

A

Shodan is a search engine that enables attackers to perfom footprinting at various levels. It is used to detect devices and networks with vulnerablities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the tor browser and how does it work?

A

Tor browser is used to access the dark web, where it acts as a default VPN for the user and bounces the network IP address through several servers before interacting with the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is netcraft?

A

Netcraft provides internet security services, including anti-fraud and anti phising services, application testing and PCI scanning. They also analyze the market share of the web servers, operating systems hosting providers and ssl certificate authorities and other parameters of the interntet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can you use IP2 Location for?

A

You can use it to analyze and trace email paths using the email header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DNS footprinting?

A

DNS is the next step of the DNS footprinting. Attackers perform DNS footprinting to gather ifnormation about DNS SErvers, DNS Records and the types of servers used by the target organization.