section 4.1 Flashcards

1
Q

Used to determine the route a packet takes to a destination

  • Will map the entire path
  • Time in TTL (Time To Live) is in hops
A

traceroute (POSIX)

tracert (Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lookup names and IP addresses

- If deprecated use dig instead

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • More advanced domain information

- Does the same as nslookup just more advanced than nslookup

A

dig or DIG

- Domain Information Groper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Helps determine TCP/IP and network adapter information

  • additional IP details
  • ping your IP address
A

ipconfig for Windows

ifconfig for Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Nmap abilities and give a description of each of them.

A
Network mapper
- Find and learn more about network devices
Port scan
- Find devices and identify open ports
OS scan
- Discover the OS w/o loggin in to a device
Service scan
- What service is available on a device
NMAP scripting
- external capabilities, vulnerabulites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • What command test reach ability, determines round-trip time
  • Uses Internet Control Message Protocal (ICMP)
A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the command that combines ping and traceroute and also describe the steps of the process and what happens in each step

A

pathping

First: run traceroute
- Build a map
Second: run ping
- Measure round trip time and packet loss at each hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This command is a TCP/IP packet assembler/ analyzer
Sends crafted frames
- Modify all IP, TCP, UDP, and ICMP values

A

hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network command to show all active connections.

A

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network command shows binaries

A

netstat -b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network command to not resolve names on the network

A

netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This command allows you to read and write to the network.

List some functions that this command can do

A
netcat
- Listen on a port number
- Transfer data
- Scan ports and send data to a port
Go as far as to run a shell from a remote device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This network scanner will search a network for IP addresses

  • Locate active devices
  • Avoids doing work on an IP address that is not there
A

IP scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List some IP scanner techniques

A

ARP
ICMP
TCP ACK
ICMP timestamp requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call a determination of a MAC address bases on an IP address

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

arp -a command

A

Lets the user view local ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Purpose of the route command

A

View the device’s routing table
-Find out which way the packets will go
Windows command: route print
Linux & macOS: netstat -r

18
Q

What is the curl command

A

Client URL

  • Retrieve data using a URL
  • Uniform Resources Locator
  • Grab the raw data
19
Q

Name some functions of the theHarvester command

A
  • Gather OSINT
  • Scrape information from Google or Bing
  • Find PGP keys by email domain
  • DNS bruteforce
    • Find those unknown hosts, vpn, chat, mail, partner, and etc.
20
Q

List some functions of the sniper command

A
  • Combine many recons tools into a single framework
    • dnesum, metasploit, nmap, theHarvester
  • Both intrusive and non-intrusive scanning options
  • Another tool that can cause problems
    ex. Brute force and server scanning
21
Q

What does the dnesum command do?

A
  • Enumerate DNS information: find host names
  • View host information from DNS servers
  • Find host names in Google
22
Q

What is Nessus

A
  • Industry leader in vulnerability scanning
  • Identify known vulnerabilities
  • Extensive reporting
    • a checklist of issues
    • filter out false positives
23
Q

What is Cuckoo

A
  • a sandbox for malware
  • a virtualized environment
  • a track and trace
    • API calls, network traffic, memory analysis
    • Traffic captures
    • Screenshots
24
Q

This is a file manipulation to view the first part of the file

A

head [option] [file]

25
This File manipulation tool allows you to view the bottom of the file
tail [option] [file]
26
What does the cat command do?
Concatenate - copy a file/files to the screen ex: cat file.txt file2.txt - copy a file/files to another file ex: cat file1.txt file2.txt > both.txt
27
What does grep do?
Find text in a file | grep PATTERN [FILE]
28
What is the chmod command. What are some options to set permissions and modes
- Change mode of a file system object - Also use octal notation ex. 7 4 4 - r = read, w = write, x = execute - Setting permissions: file owner: u the group: g others: o all: a
29
What does the logger command do?
- Add entries to the system log - syslog - Adding to the local syslog file
30
What is Toreplay? What does it do?
a suite of packet replay utilities Test security devices Test and tune IP Flow/NetFlow devices Evaluate the performance of security devices
31
This command captures packets from the command line
tcpdump
32
Name this graphical packet analyzer. Also, name some other functions
Wireshark Gathers frames on the network Extensively decodes - View the application traffic
33
This is a reference to the DD command. What does it do?
dd create a bit-by-bit copy of a drive create a disk image restore from an image
34
What does memdump do?
Copy information in system memory to the standard output stream Copy to another host across the network
35
What is Winhex?
Universal hexadecimal editor for Window OS - Edit disks, files, RAM - Disk cloning - Secure wipe
36
What does FTK imager do?
AccessData forensic drive imaging tool - includes file utilites and read-only image mounting - Windows executable
37
What does Autopsy do?
Perform digital forensics of hard drives, smartphones - View and recover data from storage devices Extract many different data types: - Downloaded files - Brows history and cache - Email messages
38
Exploitation frameworks
``` pre-built toolkit for exploitations - Build custom attacks metasploit - attack known vulnerabilities The Social-Engineer Toolkit (SET) - Spear phishing, infectious media generator ```
39
Password Crackers
``` Find the passwords online cracking - Try username/password combinations offline cracking - Brute force a hash file ```
40
Data sanitization
Completely remove data Many different use cases A one-way trip - permanent