Open Source Intelligence and Reconnaissance Flashcards

(12 cards)

1
Q

Intelligence Gathering

A

an attacker gathers information on,
and maps networks, as well as probing them for exploitable
vulnerabilities to exploit them

  • Information gathered during this phase guides the rest of the
    penetration test
  • Arguably most important part of Penetration Testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of reconnaissance

A
  • Passive Reconnaissance – gathering information on a target
    without their knowledge of your actions

o Example: Using the Internet to research a target (domain
registrations, web pages, email addresses

Active Reconnaissance – gathering information on a target where
the potential exists that your actions will be seen by the target

o Example: Port scanning the target domain’s network looking for
hosts and open services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open-source Intelligence

A
  • The action of searching
    for publicly available
    information via the
    Internet, or “open
    sources
  • Build an understanding
    of the organisation, its
    employees, and
    relationships to other
    organizations
  • Publicly available information
  • News broadcasts
  • Public request data
  • Paywalled data
  • Social Media
  • Pastebin
  • No specialist tools/techniques required
  • Can be used for social engineering
  • Can include passwords/names/IP
    addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ways they can gather info passive

A

Infrastructure data collection
IP address range
* IP address of specific systems
* Device types
* Operating systems
* Services

Employees
* Names
* Roles
* Relationships (internal/external)

Websites
* Source code
* Comments
* Libraries
* Contact details
* Script types

Email Headers
* Obtaining email
addresses
* Querying the
domains email server
* Organisations
website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Terminology - 1

A

Sniffing: Capturing network traffic for analysis or replay.

Sniffer: Software or hardware tool that captures network packets.

SPAN / Mirror Port: Switch port configured to send a copy of all network traffic to the sniffer.

TAP (Test Access Point): Hardware device that passively copies network traffic

Promiscuous Mode – network card mode in
which the host listens to all traffic on the
network, not just what’s destined or addressed
only to itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do packet sniffers work?

A

A packet sniffer puts the network interface into promiscuous mode, allowing it to capture all packets on the network segment, not just those addressed to it.

This lets the sniffer see all network traffic on that segment.

For effective sniffing, the sniffer must be within the same network block as the target traffic but can be anywhere inside that block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

shared vs switched ethernet

A

Shared Ethernet:

All devices connected on the same network bus and broadcast domain.

Messages are broadcast to all devices; intended recipient reads the message.

Sniffer in promiscuous mode can passively listen to all traffic.

Sniffing is difficult to detect.

Switched Ethernet:

Devices connected to a switch that tracks MAC addresses and ports.

Packets are sent only to the intended recipient, not broadcasted.

More secure than shared Ethernet but not fully secure.

Sniffing possible via attacks like ARP spoofing (spoofing gateway MAC to intercept traffic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Scanning

A

The process of actively probing remote networks to discover live hosts and
their open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active Network Sniffing

A

The sniffer sends packets to trigger responses and capture network traffic.

It can manipulate network devices or hosts to intercept data not meant for it.

Examples include ARP Poisoning and MAC Flooding attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICMP PING

A

Internet Control Message Protocol (ICMP)

Protocol number 1 in the IP suite

Does not carry user data

Used to check if computers are active and reachable (e.g., ping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Traceroute

A
  • Identify the path
    from you to the
    server
  • Shows where the
    path fails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transmission Control Protocol

A

Provides reliable, ordered, and error-checked delivery of data between applications

Establishes a connection before data transfer (connection-oriented)

  • Establishes sessions to control packets arrival to their destination
  • Includes the concept of a port which can be in one of three states:
    o Open
    o Closed
    o Filtered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly