Quiz Two
This site can be used to garner information about people with little effort unless the user takes steps to ensure their information stays private.
- Facebook - LinkedIN - Twitter
The Regional Internet Registrar for the Asia Pacific region that includes Australia and New Zealand is _________ .
APNIC
This system can be used to lookup information on publicly traded companies. It is a database housed by the Securities and Exchange Commission (SEC).
EDGAR
This type of attack can be used to evade network security mechanisms like an IDS by simply "chopping" up the datagrams so that they are reassembled before the adversarial device / activity could detect it.
Fragmentation
This is an important skill to have as it will save you time when doing research on a target.
Google Hacking
Open ports should respond to a ______ message.
SYN
OpenVAS is most commonly used and intended for _______ .
Vulnerability Scanning
This tool is designed to send ICMP echo requests to multiple systems. It will send multiple messages to systems before giving up and determining that it is down.
fping
Which of the commands below will initiate a hping scan that will use TCP SYN and scan for open http ports on a single IP address?
hping3 -S 72.14.207.99 -p 80 -c 1
This is widely regarded as the "de facto" port scanner. It is very powerful and customizeable via the use of scripts.
NMAP