Reconnaissance Processes Flashcards

1
Q

How do we carry out reconnaissance

A

Internet Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What areas can you research on internet for your mission

A
  1. Company Websites
  2. Social Media
  3. Discussion Groups
  4. Financial Reports
  5. News Articles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Social Engineering

A

Going undercover to get to know the employees or vendors of the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of Social Engineering?

A

Afterwork social gatherings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of information can you get from afterwork social gatherings?

A
  1. Just in casual conversations with work colleagues you can find out
    a lot of information that could help you know when the vulnerable
    times are at the company
  2. Someone may inadvertently give enough information about
    themselves and their lifestyles for you to work out their password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Dumpster diving?

A

Going through the trash to maybe get:
1. Employee Names
2. Account numbers
3. Client Names
4. Vendor information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

So in general, What are we looking for in the stages of Reconnaissance?

A

In marketing themselves a business will share a lot of information about themselves. You can find:
1. Contact Names
2. Phone numbers
3. Email addresses
4. General information about their security systems
5. Technical Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can you accomplish once you get addresses?

A

You can use location applications to:
1. Research surrounding neighbourhoods
2. Building layout
3. Work out any geographical or physical barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can you accomplish once you get employee names?

A

You can then search their social media connections for information such as:
1. Facebook
2. Linkdin
3. Tik Tok
4. Instagram …………… etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the distinction between an Ethical Hacker and a criminal hacker?

A

An Ethical Hacker must ALWAYS have permission from the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does this ‘permission’ entail

A

Before starting any work, a written documentation must be obtained, that gives the Ethical Hacker permission from the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should be included in the written documentation for permission?

A
  1. Scope
  2. Guidelines
  3. Any limitations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Do you need to record all information, document information

A

Yes, documenting every aspect of your mission should be done as soon as possible so that it is still fresh in your mind!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Google Hacking, and is it legal?

A

Google Hacking is a means of securing a lot of information that a company does not know is public. You will use some ‘operators’ to find deeper company information that can be useful.
Yes, Google Hacking is legal!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘Foot-printing’

A

You can use email and web site foot-printing to:
1. Gather some information that was not meant to be
public, but has been accidentally put out there
2. Gather information that was old but has not been disposed of
properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can web site and email foot-printing provide?

A
  1. Information Flow
  2. Operating systems
  3. File names
  4. Network connections

It is possible to create a network map without even entering the building depending on the level of the company’s security,

17
Q

What is Domain Name System (DNS) used for?

A

Using DNS is a convenient network addressing method

18
Q

What can an IP address provide you with?

A

Network access point such as an email or web server

19
Q

What are some internet researching tools?

A
  1. Google Earth
  2. Google Maps
  3. Webcams
  4. Echosec
  5. Maltego
  6. Wayback Machine
20
Q

What is Google Earth?

A

Google Earth is a satellite imagery tool that provides current and historical images of most locations. Images can date back over several decades.

21
Q

What is Google Maps?

A

Google Maps is a web mapping service that provides a street view of houses, businesses, roadways, and topologies.

22
Q

What are Webcams?

A

Webcams are online streaming digital cameras that can provide video of places, people, and activity in an area.

23
Q

What is Echosec?

A

Echosec is a tool that can be used to pull information from social media postings that were made using location services. You can select a location on a map and view all posts that have occurred at that location. These results can be filtered by user, date, or keyword.

24
Q

What is Maltego?

A

Maltego is an open-source forensics tool that can be used to pull information from social media postings and find relationships between companies, people, email addresses, and other information.

25
Q

What is Wayback Machine?

A

The Wayback Machine is a nonprofit catalog of old site snapshots. It may contain information that your target thought they had removed from the internet.