Week 3 Flashcards

(37 cards)

1
Q

What service runs on TCP/UDP port 53?

A

DNS - used for name resolution and zone transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What service uses TCP/UDP port 135?

A

Microsoft RPC Endpoint Mapper – used to locate DCOM services on Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

: Which service uses UDP port 137?

A

NetBIOS Name Service (NBNS) – used for resolving NetBIOS names on local networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is on TCP port 139?

A

NetBIOS Session Service – used for Windows file/printer sharing via SMB over NetBIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What service runs on TCP/UDP port 445?

A

SMB over TCP (Direct Host) – Windows file sharing without NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocol uses UDP port 161?

A

SNMP (Simple Network Management Protocol) – for querying network device information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What runs on TCP/UDP port 389?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What service is on TCP port 2049?

A

NFS (Network File System) – used to share directories and files over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which service uses TCP port 25?

A

SMTP (Simple Mail Transfer Protocol) – used for sending emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What uses UDP port 162?

A

SNMP Trap – used to receive alert messages from SNMP devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol runs on UDP port 500?

A

ISAKMP/IKE – used for establishing VPN tunnels (IPsec key exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What service runs on TCP port 22?

A

SSH (Secure Shell) – used for secure remote login and command execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is NetBIOS ?

A

Identifies devices by giving them human-readable names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is NetBIOS enumeration important to attackers?

A

Reveals hostnames and often usernames as well as roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some common tools for NetBIOS?

A

nbtscan, nmblookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SNMP?

A

Protocol used to monitor and manage devices.

17
Q

How does SNMP work?

A

It consists of an agent and a manager. The agent stores information about the device in a structure known as MIB. The manager is on a separate system and queries the agent to receive information.

18
Q

What are the 2 types of community strings used by SNMP?

A

Read community string and read-write

19
Q

Why is SNMP enumeration dangerous?

A

Attackers can extract sensitive information about the users, devices and with read-write access the attackers can reconfigure the devices remotely.

20
Q

What is LDAP?

A

Protocol to access directory services that contain information about the users, groups, computers, departments and access permissions.

21
Q

How does LDAP work?

A

Client sends requests to read or search directory entries.

22
Q

What is LDAP enumeration?

A

Attackers send queries to extract sensitive information from the directory.

23
Q

What are the 2 types of LDAP enumeration?

A

Manual : use Python to fetch information such as the domain name
Automated : use ldap-brute NSE script to brute force LDAP authentication

24
Q

What is NTP?

A

Protocol to synchronize time on computers over the network. Uses UDP 123.

25
Why do attackers target NTP?
NTP keeps logs of the clients that recently queried, so using special commands attackers can get the IP addresses of the devices and sometimes the OS or system names.
26
What commands do attackers use for NTP enumeration?
monlist : shows the last 600 clients on the NTP server ntptrace : traces a chain of NTP servers to the primary soucre ntpdc & ntpq : monitors NTP daemon operation
27
What is NFS?
Protocol that allows devices to share files and folders over the network. Runs on TCP 2049.
28
What is NFS enumeration?
Attacker scans and queries an NFS server to gain information like which directories or files were shared, permissions on those files shared and maybe gaining read or write access if files were not properly configured.
29
What is SMTP?
Protocol to send emails between clients and servers. TCP port 25.
30
What are the 3 SMTP commands?
VRFY : verify if a user exists EXPN : reveals the real username behind aliases RCPT TO : specify recipient
31
How do attackers use the commands?
Observer server responses after typing commands to gain and compile a list of valid usernames.
32
What do attackers use for SMTP enumeration?
nmap, metasploit, netscan tools pro and smtp-user-enum
33
What is a DNS zone transfer?
Its when the DNS database is replicated from a primary DNS server to a secondary one.
34
How can attackers exploit this?
If the zone transfer is improperly configured and allowed for unauthorized users, attackers can perform a full zone transfer and get all the info!!!
35
How do attackers do it?
Try to request a zone transfer using tools like dig, nslookup and DNSRecon.
36
What is DNS cache snooping?
Attacker queries a DNS server to see if a specified DNS record is already cached.
37
What are the 2 methods of cache snooping?
Non-recursive : shows if record is currently cached Recursive : How long the record stays in the cache