Ethical hacking final review chapters 6+7+8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Enumeration of Windows systems can be more difficult if port _______ is filtered.

139

compiler

A program that converts source code into executable or binary code.

NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?

Backward compatibility

Which of the following takes you from one area of a program (a function) to another area?

Branching

___ takes you from one area of a program (a function) to another area.

Branching

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

Default

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

Domain Controllers

What type of Windows Server is the most likely server to be targeted by a computer hacker?

Domain controller

Which testing process is the most intrusive?

Enumeration

Why enumeration more intrusive process than port scanning and foot printing?

Enumeration is more intrusive because you're not just identifying a resource; you're attempting to access it. It goes beyond passive scanning of a network to find open ports. For example, sometimes this process entails guessing passwords after determining a username. Moreover, to enumerate first you need to determine OS of the target host by Port scanning and footprinting. For example, NBT (NetBIOS over TCP/IP) is the tool for enumerating Microsoft Oss

A NetBIOS name does not need to be unique on a network.

False

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

Footprinting

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

HFNetChk

Which of the following is the act of performing a task over and over?

Looping

____ is the act of performing a task over and over.

Looping

Which of the following commands is a powerful enumeration tool included with Windows?

NBTSTAT

What command connects to a computer containing shared files and folders?

Net use

Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?

Net view

Which of the following protocols does NetBios use to access a network resource?

NetBEUI

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

NetBIOS

The computer names you assign to Windows systems are called which of the following?

NetBIOS

A remote administration tool that can be run on most operating systems. It also allows an administrator (and an attacker) to gain details about a remote system.

Simple Network Management Protocol (SNMP)

a null session is an anonymous connection established without credentials, such as a username and password. Also called an anonymous logon, a null session can be used to display information about users, groups, shares, and password policies.

True

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

Windows Containers

A well documented Windows's OS vulnerability was null sessions. What /windows operating system was the first to disable null sessions by default?

Windows Server 2003

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

null session

When writing a script which statement allows you to avoid creating an endless loop in your script?

while

a way of having your program repeat an action a certain number of time

while loop

checks whether a condition is true and then continues looping until the condition becomes false

while loop

Carelessly reviewing your program's code might result in having which of the following in your program code?

bug

error that causes unpredictable results

bug

structure that holds pieces of data and functions

class

converts a text-based program, called source code, into executable or binary code

compiler

tells the compiler how to convert a value in a function

conversion specifier

performs an action first and then tests to see whether the action should continue to occur

do loop

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

enumeration

A ____ is a mini program within a main program that carries out a task.

function

Unauthenticated connection to a Windows computer that uses no logon and password values

null session

English-like language you can use to help create the structure of your program

pseudocode

A loop usually completes after ____________________ is conducted on a variable and returns a value of true or false.

testing

represents a numeric or string value

variable

for loop

A loop that initializes a variable, tests a condition, and then increments or decrements the variable.

assembly language

A programming language that uses a combination of hexadecimal numbers and expressions to program instructions that are easier to understand than machine-language instructions.

algorithm

A set of directions used to solve a problem.

____________________ language uses a combination of hexadecimal numbers and expressions, such as mov, add, and sub, making it easier for humans to write programs than in binary or machine language.

Assembly

Security testers conduct enumeration for what reasons?

Gaining access to shares and network resources, and obtaining user logon and group memberships

class

In object-oriented programming, the structure that holds pieces of data and functions.

NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

NetBT

What does the "NBT" part of "NBTscan" stand for?

NetBios over TCP/IP

Most NetBIOS enumeration tools connect to the target system by using which of thefollowing?

Null sessions

Which of the following tools can be used to enumerate Windows systems?

OpenVAS, dumplt, hyena

Which on of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

SNMP

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

SecureBoot

What upper-level service is required to utilize file and printer sharing in Windows?

Server Message Block

Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?

NetBIOS

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

TCP/IP

conversion specifier

Tells the compiler how to convert the value indicated in a function.

Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent.

True

By default, the SNMP service uses "public" as a credential for read-only access and "private" for read-write access.

True

NBTscan is a utility can be used for enumeration Windows OSs.

True

NBTscan is a utility that can be used for enumerating Windows OSs.

True

NetBIOS isn't a protocol; it's just the interface to a network protocol that enables a program to access a network resource.

True

NetBIOS over TCP/IP is called NBT in Windows 2000 Server; in Windows Server 2003, it's called NetBT.

True

SMB listens on TCP port 445 and doesn't need to use NetBIOS over TCP/IP unless support for older Windows versions is required.

True

The SNMP service can run on both Windows and *nix, but for this section we will focus on *nix. SNMP is useful for administrators who want to see system statistics, version numbers, and other detailed host information remotely.

True

A null session is enabled by default in all the following Windows versions except:

Server 2008

Why should system administrator disable unused services and account?

System administrator should disable unused services and account because they give intruders a potential point of entry into a network. For example, if you have a Windows Server 2016 system acting as a file server, you certainly don't need DNS services running on it; doing so leaves port 53 TCP/UDP open and vulnerable to attack. The idea is simple: Open only what needs to be open, and close everything else—also known as reducing the attack surface. (The attack surface is the amount of code a computer system exposes to unauthenticated outsiders.) With fewer services exposed, there's less chance of an attacker being able to find an unpatched vulnerability In addition, filtering out unnecessary ports can protect systems from attack. such as FTP (20 and 21 TCP) TFTP (69 UDP), Telnet (23 TCP) and other. The best way to protect a network from SMB attacks is to make sure perimeter routers and firewalls filter out ports 137 to 139 and 445. Blocking ports 139 and 445 has the added benefit of protecting against external null session attacks. An attacker can gain entry through many other ports.

Several hacking tools that target SMB can still cause damage to Windows networks. Two well-known SMB hacking tools are L0phtcrack's SMB Packet Capture utility and SMBRelay, which intercept SMB traffic and collect usernames and password hashes.

True

The net view command can be used to see whether there are any shared resources on a server. True or False?

True


Conjuntos de estudio relacionados

Domain 3 RHIA Practice Questions

View Set

Shari is creating a process flow diagram of her company's integrated business processes, after which of the following activities should she include a decision point?

View Set

Teaching English Language Learners

View Set

epidemiology 4: Measures of Mortality Direct & Indirect Age Adjustment Validity & Reliability Prognosis

View Set

Earth In The Solar System (Kepler, Seasons, Phases) Summative

View Set

Chapter 8: Influence Tactics of Leaders

View Set

Employee Engagement & Retention Quiz

View Set

Cell Organelle Functions Match Up

View Set

Nursing Management of Pain During Labor and Birth

View Set