Module 5: Scanning and Evasion Techniques

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which Nmap option can be used to make it harder to detect packets when evading firewalls and IDS?

-f (fragmented packets)

Which option can be used in Netdiscover to run a passive scan?

-p

When using Nmap, use _____ to do a ping scan

-sP

How many scripts are available in Nmap 7.7?

588

Privacy Badger

A Chrome extension that deletes invisible trackers

ACK flag

Acknowledges that a previous packet has been received

fping

An enhanced Ping utility for pinging multiple targets simultaneously.

netstat -a

Displays all connections and listening ports on your device

Which flag indicates that there is no more data to be sent and that the connection should be terminated?

FIN

True or False. The netdiscover -f command is used to scan a range of IPs using the Netdiscover tool.

False; use -r

PSH flag

Push the data to the application without buffering; don't wait for more data to be transmitted with it

RST flag

Resets the connection

Idle Scan

The hacker finds a target machine, but wants to avoid getting caught, so, he finds another system to take the blame. The blamed system is called a zombie machine because it's disposable and creates a good distraction. The scan directs all requests through the zombie machine. If that zombie machine is flagged, the hacker simply creates another zombie machine and continues to scan.

OS fingerprinting

The practice of identifying the operating system of a networked device based on response behavior

ping sweep

The process of sending ping requests to a series of devices or to the entire range of networked devices to wait for responses to know which hosts are alive

URG flag

This flag is used to signify urgent data.

SYN flag

This flag is used when first establishing a TCP connection and make sure the receiving end knows to examine the sequence number field; synchronizes sequence numbers

hping3

Tool used to test the security of firewalls; a custom network packet generator and analyzer tool

True or false? A filtered port indicates that a packet-blocking device is preventing the probe from reaching the target.

True

Nmap ping scan command

nmap -sP

Intrusion detection works _____ to identify, log, and report any malicious activity.

out-of-band

What sends a succession of probe packets to an IP range on a network to identify which hosts are alive and responding?

ping sweep

socket

port and IP address mapping

_____ identifies listening TCP and UDP ports on a target system looking for services

port scan

strobe mode

scanning method that quietly checks a few ports at a time

stealth mode

scanning mode that uses scans that are designed to avoid detection on monitoring systems' logs

Once reconnaissance is complete and enough information is available, the second step of penetration testing is _____.

scanning/enumeration

Scanning a network should be done under the radar. _____ mode quietly checks a few ports at a time, and stealth mode uses scans designed to avoid detection.

strobe

Which website can be used to ensure that DNS information is not being leaked?

www.dnsleak.com

curl

Kali tool that grabs web banners

Armitage

Kali tool that seeks vulnerabilities and provides a list of suitable exploits

FIN flag

Last packet from the sender; "I have nothing else to send"

nmap

a security scanner built into Kali that performs a variety of scans, discovers hosts and services, and reports devices that are alive

Nipe

a tool that utilizes the Tor network as a user's default gateway to offer a level of privacy and anonymity.

The ____________ number is the sequence number from the sender increased by one.

acknowledgement

Striker

automated scanning and deep information-gathering tool built into Python; offers port/service scanning and vulnerability scanning

ping -c

count: pings the host a specific number of times.

netdiscover

discovery tool that can perform recon and discovery on wireless and switched networks using ARP request

True or False? bping is a tool that can be used to send ICMP echo requests to several hosts at once.

false; fping

With a(n) _____ scan, the TCP header is split over several packets and makes it hard for packet filters and intrusion detection systems to detect a port scan.

fragmented (-f)

port scan

identifies listening TCP and UDP ports on a live target system, looking for services

network mapping

identifying topology of target network and creating a map

IPS works ____ to block attacks

in line


Kaugnay na mga set ng pag-aaral

American Red Cross BLS Lesson 3 Pre-Assessment

View Set

Accounting - Chapter 6: LearnSmart Study Module

View Set

SECOND SEMESTER COORDINATED SCIENCE MULTIPLE CHOICE

View Set

Nursing: Semester 1 Lecture Exam 6

View Set

Python Data Structures / Algorithms

View Set

UNIT 14: Real Estate Financing- Principles

View Set

Combo with "evolution" and 1 other

View Set

Wrist/Hand Extensors & Forearm Supinators

View Set