_ is a system process that runs on Windows OSs to facilitate the exchange of network data.
What is the Net view command and how can you use it?
The Net view command is a built-in Windows tool that gives you a quick way to see whether there are any shared resources on a computer or server. To see the syntax for this command, type net view ? at the command prompt.
The enumeration process for Windows Me is the same as for Windows 98.
NBTscan is a tool for enumerating Windows OSs.
__ is an enhancement to NDS (NetWare Directory Services).
One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values.
__ implemented Windows File Protection to prevent core system files from being overwritten.
Windows XP Professional
Probably the biggest enhancement in Windows 95 was the ____________________, a database that stores information about the system’s hardware and software.
NetBIOS names have a limit of ____ characters.
As a security professional, should you learn about the security issues in the NetWare OS? Why or why not?
Many security professionals assume that knowledge of just one operating system is enough, but focusing on Windows and ignoring *nix systems—or vice versa—can limit your career as a security professional. Similarly, some security professionals see Novell NetWare as a “dead” OS, but many corporations still rely on their faithful NetWare servers that keep plugging away.
LDAP (port ____) is the protocol used to access Novell’s eDirectory, Microsoft Active Directory, and Apple Open Directory.
Windows 98 introduced the ____ file system.
How does Windows 7 differ from its predecessors?
Windows 7 has an optional Windows XP Mode (XPM) that allows running older applications in a virtual Windows XP environment, because software incompatibility issues have prevented many companies from upgrading from Windows XP. However, XPM requires late-model processors that support virtualization extensions, and upgrading to Windows 7 from XP requires a complete reinstallation. Other improvements include faster startup, better overall performance, and refinements to the UAC feature, the desktop/taskbar user interface, and integration of peripheral devices.
To determine what resources or shares are on a network, security testers must first determine what _________________________ is being used via port scanning and footprinting.
operating system (OS)
Why do hackers pay attention to NetBIOS computer name suffixes?
The NetBIOS name suffixes correspond to the services, or resource types, running on a computer. You don’t need to memorize all the suffixes, but several are critical because they identify the computer or server being enumerated as a standalone computer or a domain controller. Hackers often exert more effort attacking computers identified as domain controllers because they can offer more information, including logon names for user accounts and network resources.
The ____ command gives you a quick way to see whether there are any shared resources on a computer or server.
The most recent version of Novell OS is called ____.
Novell Open Enterprise Server
Nessus can be used to enumerate Windows OSs, as well as ____________________ systems.
With ____, you can have your desktop computer or laptop start in both Windows and Linux.
Grand Unified Bootloader
Many password-guessing programs are available that can determine a password in a matter of seconds. One such program the Department of Defense uses is ________________
The computer names you assign to Windows systems are called ____ names.
What is Hyena and what can it be used for?
Hyena is an excellent GUI product for managing and securing Microsoft OSs. The interface is easy to use and gives security professionals a wealth of information. With just a click,you can look at the shares and user logon names for Windows servers and domain controllers. If any domains or workgroups are on the network, this tool displays them, too. Hyena can also display a graphical representation of the following areas:
- Microsoft Terminal Services
- Microsoft Windows Network
- Web Client Network
- Find User/Group
Windows NT 3.51 uses the ____ file system.
In NetWare 5.0, TCP/IP replaced ____ as the default protocol.
NetWare’s ____ is a graphical Java utility for centralized network administration.
The “NBT” part of “NBTscan” is an abbreviation for ____________________ over TCP/IP.
A NetBIOS name does not need to be unique on a network
The Netmon Agent is a Linux network-monitoring tool.
What is DumpSec and what can it be used for?
DumpSec is a popular enumeration tool for Windows systems. The information you can gather with this tool is astonishing. For example, after connecting to a Windows server, you can download—or, as it’s called in DumpSec, “dump”—the following information:
- Permissions for shares
- Permissions for printers
- Permissions for the Registry
- Users in column or table format
- Policies (such as local, domain, or group policies)
The most popular enumeration tool for security testers and hackers alike is the ____ utility, which enables you to find out who is logged in to a *nix system with one simple command.
The open-source descendant of Nessus is called ____.
Why is enumeration a more intrusive process than port scanning or footprinting?
Enumeration is more intrusive because you’re not just identifying a resource; you’re attempting to access it. It goes beyond passive scanning of a network to find open ports. Sometimes this process entails guessing passwords after determining a user name.
___ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas.