Mod 14 Flashcards
(164 cards)
PORT 445
SMB Direct | TCP
WINDOWS HASH:
___ - A secure asymmetric algorithm. Passwords up to 256 characters (all ASCII characters, 211 unique characters).
NT LAN Manager (NTLM) Hash
NETCAT Options:
__ = Help; provides all options
-h
PAYLOAD TYPES:
___ - Opens a port on the target system and listens for incoming connections. The attacker initiates the connection (call-in) to the target. Firewalls often block the connection.
Bind TCP
___ gathers information about a target of interest without actually probing the target.
Passive Analysis
Syntax for Nikto
nikto -host
- host = specific target host
- H = list all options
PORT 110
POP3 | TCP
___ ties directly into the target development aspect of the Target Research/SIGINT Analysis Module.
Information Gathering
___ - Designed to target a specific vulnerability in an application. Most common method of execution in use is the Buffer Overflow.
Code-Based Exploit
Active Exploitation skills are also employed in the civilian sector by network security professionals who perform ___.
Penetration Tests (pentests)
SCAN EXTENSIONS:
___ = Version detection communicates with ports to determine what is actually running.
-sV
___ is a technique that involves connecting to common applications on target host to identify version of running applications. Can be done suing Nmap, Telnet, and Netcat.
Banner Grabbing
PORT 513
RLOGIN | TCP
PAYLOAD TYPES:
Staged systems:
___ - Fully functional remote shell loaded by the Stager. Offers the availability to run commands on the target system through a remote shell.
Stage (s1)
NETCAT Options:
__ = Indicates verbose details; it only reports open ports.
-v
___ is a command used to generate and output various types of shellcode payloads. Used for standalone custom payloads, used outside of Metasploit framework.
msfpayload
HOST DISCOVERY:
___ = Disable host discovery. Does not ping hosts at all before scanning them; allows scanning of networks through firewalls that block ICMP.
-Pn
PORT 3389
RDP | TCP
PORT 53
DNS | TCP & UDP
Exploits used through ___ do not use encryption so, when traversing a hop, the exploit and payload is vulnerable to exposure and capture.
Satellite Hops
Linux:
Syntax for ping with record route.
ping -R
-R = invokes record route option
United Stated Codes (USC)
Title 18 ___ - Store Wire and Electronic Communications and Transactional Records Access. Unlawful Access to Stored Communications.
Title 18 USC 2701
Cisco IOS Passwords:
Type 7 is ___ and type 5 is ___.
Symmetric
Asymetric
NETCAT Options:
__ = Reports all responses within the range
-vv