• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back
List the five phases of hacking
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Tracks
Give an example of of Passive Reconnaissance
Searching public records like Google or library records
Give an example of active reconnaissance
Interacting with company employees to solicit information
What types of information do attackers gather from the scanning phase?
computer names, IP addresses and user accounts
What is meant by a "shrink wrap code attack"
utilizing built in scripts in applications that were designed to make administrators jobs easier, which are inadvertantly left in during installation
What is entailed in open source or passive information gathering?
collecting information about a potential target from publicly available sources
What is entailed in active information gathering?
gathering information through social engineering, on-site visits, interviews and questionnaires.
What is entailed in anonymous footprinting?
Gathering information from sources where the author or source cannot be traced?
What is pseudonymous footprinting ?
collecting information that might be published under a different name in attempt to preserve privacy.
What is organizational or private footprinting?
collecting information from an organization's web-based calendar and email services
What is internet footprinting
collecting information about a target from in the internet.
What are the three objectives of footprinting?
collect network information, collect system information and collect organizational information
Name the eight steps in the footprinting methodology
Internet footprinting, competitive intelligence, whois footprinting, DNS footprinting, network footprinting, website footprinting, email footprinting, google hacking
Name three tools useful in extracting target information from the internet
web data extractor, spiderfoot, robtex
Name eight tools useful for finding information about people on the internet
yahoo people search, 123 people search, address.com, zaba search, wink people search, public people finder, people finders, people lookup
Name eight competitive intelligence tools
SEC info, business wire, c-span, choicepoint online, cnn money company research, web investigator, forbes 500, barrons
Name eight whois lookup tools
Sam Spade, My IP Suite, CountryWhois, LanWhois, NetRanger WhoIs, Lapshins Whois, Alchemy eye, WebFerret
Name eight online whois tools
whois, whois lookup, better whois, geek whois, arin whois database search, network solutions whois, domaintools, autowhois,
What is a DNS Type A record
Points to a host IP address
What is a DNS MX record
points to a domain's mail server
What is a DNS NS record
points to host's name server
What is a DNS CNAME record
canonical naming allows aliases to a host
What is a SOA DNS record
indicate authority for a domain
What is a SRV record?
service records
What is a PTR record
maps ip address to a host name
What is a RP record
responsible person
What is a HINFO record
host information record which includes CPU type and OS
Name eight DNS interrogation tools
netinspector, NSLookup, Digdug DNS Analyzer, MSR Strider URL Tracer, WhereISIP, DNSMap, Multiple Addresses, DNS Tool
Name eight DNS Interrogation tools online
Online DNS Tools, Better Whois, Professional Toolset, Geek Whois, DNS record, Mozzle Domain Name pro, Check DNS, Domain Information Groper
Name sixteen traceroute tools
VisualRoute Trace, GEOSpider, vTrace, Magic NetTrace, 3D Visual Trace Route, Visual IP Trace, Trout, Patrice Zwenger Traceroute, AnalogX HyperTrace, Layer Four Traceroute, TCP Trace Route, Ping Plotter, Network Systems Traceroute, Tracepath, Roadkil's Trace Route, Ping-Probe
Name eight website mirroring tools
Wget, Website Ripper Copier, Webripper, BlackWidow, WinWSD, Reamweaver, xaldon webspider 2, teleport pro
How can you use Website Watcher in reconnaissance
By watching changes on websites
Name twelve tools used for email tracking
emailTrackerPro, Read Notify, DidTheyReadIt, PoliteMail, VisualRoute Trace, GeoSpider, vTrace, Magic NetTrace, 3d Visual Trace Route, Visual IP Trace, Trout, Patrice Zwenger Traceroute
What is the purpose of a ping sweep?
to determine the live hosts from a range of IP addresses
Name the six TCP communication flags
SYN, ACK, FIN, PSH, RST, URG
What is the command string using hping 3 to perform an ICMP Ping?
hping3 -1 {IP Address}
What is the command string to perform an ACK scan on port 25?
hping3 -A {IP Address} -p 25
What is the command string to perform a UDP scan on port 337?
hping3 -2 {IP Address} -p 337
What is the command string to determine the initial packet sequence number in hping3?
hping3 {IP Address} -Q -p 139 -s
What is the command in hping3 to perform a SYN scan on port 20-50?
hping3 -8 20-50 -s {IP Address} -v
What is the command in hping3 to perform a FIN, PSH and URG scan on port 80?
hping3 -F -p -U {IP Address} -p 80
What is the command in hping3 to scan an entire subnet for a live host?
hping3 -1 10.0.0.x --rand-dest -I eth0
What is the command in hping3 to intercept all traffic containing HTTP signature?
hping3 -9 HTTP -I eth0
Using half open scanning, if a a client sends a SYN packet to a server and the server responds with a RST packet, is the port open or closed?
Closed
Using half open scanning, if a a client sends a SYN packet to a server and the server responds with a SYN/ACK packet, is the port open or closed?
Open
True or False: Using an XMAS Tree scan against Windows 7 is a good way to determine open port information?
False: XMAS tree scans do not work against any current version of MS Windows.
In an XMAS Tree scan what flags in the TCP frame are set?
URG, ACK, RST, SYN, FIN
In an XMAS tree scan if the remote device responds with a RST packet, is the port open or closed?
closed
What is the command string to perform an XMAS tree scan in NMAP?
nmap -sX {IP Address}
What is the command string to peform an NMAP FIN scan?
nmap -sF {IP Address}