Random Recon/ scan Flashcards

1
Q

Name Packet Crafting tools (npow +2)

A

NetScan, PackEth, Ostinato, WAN Killer, Lan Forge Fire, Colasofts- Packet Builder (has three windows packet list, code builder and hex view) Packet builders can fragment packages to get past IDS’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

netstat -an

A

displays all connections and listening ports with addresses and port numbers in numerical form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

netstat -b

A

when run with admin privileges you can see executable tied to open port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ping sweep tools

A

Nmap, angry ip, Solar Winds Engineer Toolset, Network Ping, OPUtils, Superscan, Advanced IP Scanner, Pinkie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steps in scanning methodology (7)

A
check for live systems
check for open ports
scan beyond IDS
perform banner grabbing
scan for vulnerabilities
draw network map
prepare proxies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hping2 -1 ipaddr

A

hping2 syntax to icmp ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hping2 -2

A

hping3 syntax to set up udp mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-8 eg. hping2 -8 2-80

A

hping3 flag to set scan mode scans ports 2 thru 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

–flood hping2 -S -a -p 22

A

hping3 flag for for flood -send syn flood to port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port scanning tools- regular (3)

A

Nmap, PRTG network Monitor, MegaPing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port scanning- Mobile (fzips)

A

ip scanner, fing, zANTi, PORT droid, Super Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is active OS fingerprinting

A

Sending crafted, non standard packets to remote host and analyzing replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is passive OS fingerprinting

A

Sniffing packets and analyzing TTL, window sizes, Don’t Fragment flags and ToS (Type of Service) fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tools that allow IP spoofing (4) (SHaNK)

A

Nmap, Hping, Scapy, Komodia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is gzapper

A

Clears Google cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability Scanning

A

Running a tool against a target to see what vulnerabilities it may have

17
Q

Where are Windows Passwords stored

A

C:\windows\System 32\config\SAM. Machines that are part of a domain passwords are stored and managed by the domain controller

18
Q

Linux enumeration CMD line tools

A

finger (provides info on the user and host machine), rpcinfo and rpcclient (provide info on the rpc enviornment) and showmount (displays shared directories on the machine.

19
Q

Active banner grabbing

A

send crafted packets to remote systems and comparing responses to determine OS

20
Q

Passive banner grabbing

A

Reading error messages (telnet connect to port 80 or nc and response), sniffing network traffic or looking at page extensions

21
Q

SNMP MIB

A

Management Information Base hold information on devices on a subnet arranged by the OID object identifiers. MIB entries can identify what device is, os, usage stats and even change setting on devices. retrieval of info is a GET request. Change of of config is a SET request. trap (alert) port 162

22
Q

What version of SNMP offers encryption and auth and integrity

23
Q

What version of ntp offers encryption and auth and integrity

24
Q

LDAP general info

A

session started by client on port 389. Hierarchical database return queries using BER Basic Encoding Rules. Can retrieve usernames, domain info address telephone, system data etc.

25
LDAP enumeration tools (SJL +2)
Softerra, JXplorer, Lex, LDAP Admin, Active Directory Explorer
26
NetScan, PackEth, Ostinato, WAN Killer, Lan Forge Fire, Colasofts- Packet Builder (has three windows packet list, code builder and hex view) Packet builders can fragment packages to get past IDS's
Packet Crafting tools
27
Nmap, angry ip, Solar Winds Engineer Toolset, Network Ping, OPUtils, Superscan, Advanced IP Scanner, Pinkie
ping sweep tools NANSOAP
28
Nmap, PRTG network Monitor, MegaPing
Port scanning tools- regular (3) (NPM)
29
ip scanner, fing, zANTi, PORT droid, Super Scan
Port scanning- Mobile (fzips)
30
Nmap, Hping, Scapy, Komodia
Tools that allow IP spoofing (4) (SHaNK)
31
Softerra, JXplorer, Lex, LDAP Admin, Active Directory Explorer
LDAP enumeration tools (SJL +2)