• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/86

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

86 Cards in this Set

  • Front
  • Back
What are the 8 phases to exploitation?
Foot printing
Scanning
Enumeration
Gain access (exploitation)
Privilege escalation
Situational awareness
Covering tracks
Creating backdoors
What are 3 commonly used techniques used for foot printing?
Trace Route
Record Route (ping -r)
Ping Sweep
What are the 3 types of trace routes?
ICMP
UDP
TCP
What type of trace route is the default for windows?
ICMP
How many packets are sent with an ICMP trace route?
3
What type of trace route is the default for unix?
UDP
What does a UDP trace route include other than a destination IP address?
destination port
Where does a UDP trace route destination port normally start?
33000
True or False

During a UDP trace route:

The client will increment the destination port?
TRUE
True or False

During a TCP trace route:

The trace route will be directed to a specific TCP port?
TRUE
During a TCP trace route what will be returned when the target is reached?
RST
This command and option combination will will store the outbound interfaces that a trace route can't retrieve; this information is stored in the IP header options field.
ping -r (windows)

ping -R -s -v (unix)

-R invokes record route
-s send 1 datagram/sec collect stats
-v verbose mode (display results)
_____ is used to determine if a given range of IP address are live. It consists of ICMP echo requests sent to multiple hosts.
ping sweeping
This phase identifies the target OS and listening ports/applications.
Scanning
What are the 2 types of OS fingerprinting?
Active & Passive
_____ fingerprinting is defined as analyzing the TCP/IP stack of an OS.
Active
_____ sends a packet with the "FIN" control flag set to an open port of a host and waits for a response.
FIN Probe
The correct response to a _____ is to not respond, however, some systems such as windows, HP-UX, and Iris will respond with the "RST" "ACK" flags set
FIN Probe
A _____ sends a packet with one of the bits set in the reserver undefined TCP flag section of the TCP header. Linux systems prior to kernel 2.0.35 will keep the flag set in their response. Other OSs will reset the connections when they receive it.
BOGUS Flag Probe
_____is used to find patterns in the initial sequence numbers ISN chosen by the TCP implementation when responding to a connection request.
TCP ISN Samling
_____ relies on intentionally creating a half-open connections with a target. When the target does not see the final ACK, it sends another SYN plus ACK based on the time out interval between re-transmissions you could fingerprint the OS.
(RTO) Re-transmission Time OUT
_____ fingerprinting is defined as monitoring network traffic and analyzing it to determine an OS
Passive
What are four items you can look at in a packet capture to passively ID an OS?
TTL
Window Size
DF (Don't Fragment)
TOS (Type of Service)
List some passive OS finger printing tools.
P0f
Ettercap
Wireshark
_____ is the most basic form of TCP scanning. It uses the connect system call of the OS on a target system to open a connection to every open port on that machine.
TCP connect scan
_____ is referred to as a "half-open" scan. The scanner sends a packet with the SYN flag set to all ports on the target and waits for the responses from the target, however, it does not send teh final ACK back
SYN stealth scan
True or False

Closed ports always send a RST in response to a SYN?
True
____ sends a packet with the SYN control flag set to all ports on the target and waits for the responses. It completes the 3-way handshake.
TCP connect scan
_____ sends a packet with the SYN control flag set to all ports on the target and waits for the responses from the target, but does not send the final ACK back to the target.
SYN Stealth scan (half-open)
_____ sends a packet with NO control flag set to all ports on the target machine and waits for the responses. Open ports will ignore the packet, while closed ports will respond with a RST.
TCP Null scan

(not effective against MS)
_____ sends a packet with the FIN control flag set to all ports on the target and waits for the responses. Open ports will ignore the packet, while closed ports wil respond with a RST.
TCP FIN scan

(not effective against MS)
_____ sends a packet with the FIN, URG, and PSH control flags set to all ports on the target and waits for the responses. Open ports will ignore the packet, while closed ports will respond with a RST.
TCP Xmas scan

(not effective against MS)
_____ sends a connect scan, but breaks it up into a fragmented scan set to all ports on the target machine.
TCP Frag scan
_____ utilizes the Identification protocol to provide disclosure of the owner of processes connected to TCP services. The target must be running Identd.
TCP reverse Ident scan
_____ sends an ACK packet (with random acknowledgment/sequence numbers) to the ports specified.
ACK stealth scan
_____ similar to the ACK scan except that it can sometimes detect open ports as well as filtered/unfilered ports due to an anomaly in the TCP window size reporting by some OSs.
TCP window scan
_____ uses exclusion sequence rule. It sends UDP requests and if no replies come back, it's assumed open. If it receives "Destination Unreachable", it's assumed closed.
UDP scan
_____ sends raw IP packets without any further protocol header to each specified protocol on the target; if it receives an ICMP protocol unreachable message, then the protocol is not in use. Otherwise, it assumes it is open.
IP protocol scan
_____ simply generates and prints a list of IP addresses or host names without actually pinging or port scanning them.
List scan
_____ is an advanced scan method that allows for a truly blind TCP port scan. It uses the IP identification field in teh IP header. This field is utilized to reassemble fragment packets. Most OSs increment this field by a value of 1, regardless if there is fragmentation.
Zombie scan (Idle Scan)
This option Floods open TCP/UDP ports with SunRPC program NULL commands to determine whether they are RPC ports, and if so, what program they call up.
RPC scan
The _____ option attempts to determine what type of OS you are scanning
OS detection
This option communicates with open TCP/UDP ports to determine more about what is actually running.
version detection
_____ is a command line TCP/UDP port scanning tool provided by Foundstone. It's small size makes it a great "take it with you" scanner.
FCscan
The _____ phase focuses on validating user accounts and verifying application versions which leads to the exploitation selection.
enumeration
_____ involves connecting to common applications on the target to identify the version of teh applications.
Banner grabbing
Most popular methods of banner grabbing are done in what 2 ways.
Telnet
Netcat
The _____ command displays the target host's NFS exported file system.
showmount
The _____ command displays information on logged-in users.
finger
The _____ command displays information on logged-in users. similar to the finger command.
rusers
The _____ command displays RPC services running on the target host by program #, transport, service name, and owner.
rpcifo
The _____ utility uses SNMP GETNEXT requests to query objects in the management information base.
SNMP-Walk
What group does each ASN# represent? (7th digit)
ASN 1= name, location, description of equipment
ASN 2= network Interface and their measure traffic
ASN 3= address translation
ASN 4= IP packet statistics
ASN 5= stats about received ICMP messages
ASN 6= TCP algorithms, paramaters, and statistics
ASN 7= UDP traffic statistics
ASN 8= EGP protocol traffic statistics
ASN 10= Reserved for media-specific MIBs
ASN 11= SNMP traffic statistics
A _____ occurs when data written to a buffer, due to insufficient bounds checking, corrupts data valued in memory addresses adjacent to the allocated buffer.
buffer overflow
What are the 2 types of buffer overflows?
Stack Buffer Overflow
Heap Buffer Overflow
A _____ stems from the use of unfiltered user input in the format string parameter of various C programming language functions that perform formatting.
Format String Attack
A _____ attack is derived from the process of converting data that has more than one possible representation. This type of attack is normally associated with web servers to access information OUTSIDE the root web directory. Normally used for directory traversal attacks.
canonicalization
_____ refers to inputting raw transact SQL queries into an application to perform an unexpected action or result.
SQL injection
This attack sends a modified RPC packet set to the host name of the remote system, it will then be processed as if it was a local request.
Sadmin exploit
This tool overflows the telnet client environment variable buffer with 65 characters which caused the remote system to drop the user into a shell.
TTYPrompt Exploit
This attack targets a specific function in the ftpd service called globbing. It sends bogus RNFR requests with 73 self-referencing directory locations "./" this is done four times, escaping the boundary of the ftpd service and then stores exploit code into memory.
WU-ftpd exploit (7350wurm)
This attack loads user-specifig kernel modules by using directory traversal sequences and employing the mount() or sysfs() system calls. If successful it will call out a shell with root privileges.
Solaris vfs_getvfssw() exploit
What are the 4 modes for john the ripper?
external
internal
single
wordfile
What category involves identifying logged on users, specific processes, identifying hardware components, possible security packages, and logging capabilities?
Situational awareness
The _____ command displays a summary of system and user activity.
w
The _____ command displays logged in username, terminal, login time, and where the user logged in from.
who
The _____ command displays logged in username, active processes/CPU time owned by the user and login time. The header displays the time of day and machine name.
whodo
The _____ command displays information on all users (regardless of whether they are logged in) and system accounts. Output displays user, UID, froup name, GUID, and comment name.
logins
The _____ command prints information on active processes.
ps
The _____ command for solaris and the _____ command for linux provides interactive monitoring of active processes. Also provides a summary of how many processes are running and the owner.
solaris: prstat

linux: top
The _____ command displays information about the processor to include the type, co-processor, and processor chip.
psrinfo
The _____ command displays information about terminal, disk, and tape I/O activity.
iostat
The _____ command displays information about the current system.
uname
The _____ command displays information about disk space usage.
df
The _____ command displays information about installed software packages.
pkginfo
The _____ command displays all patches on the system.
showrev -p
What file controls what will be logged and where it will be logged?
/etc/syslog.conf
What file controls where the logs will be sent (what system)?
/etc/hosts
This utility removes user's last entry from the WTMP, UTMP, LASTLOG, WTMPX, and UTMPX binaries. It works with most unix variants.
zap3
What is the only shell that does not have a shell history file?
bourne shell (sh)
What are 3 ways to modify a history file or log file?
vi
copy and replace
echo complete file to /dev/null (most intrusive)
What command would you use to modify the date of a file?
touch
_____ provide an easy means to return to the target after is has been exploited.
Back doors
_____ is a program that will add 3 back doors on a target.
SM4CK
_____ a collection of programs that support the following concepts: Hiding processes/directories/files, running packet sniffers, clearing logs, allowing back doors, and capturing local logins and passwords.
Root kits
What are the 2 types of root kits?
application

kernel