Chapter 6 Enumeration

Ace your homework & exams now with Quizwiz!

Monitor SNMP ports

Block or monitor activity on ports 161 and 162 and any other ports that you have configured for SNMP traffic.

Change default passwords

Change default passwords on all devices and services.

DNS zone restriction

DNS zone restriction ensures that a server provides copies of zone files to only specific servers.

Enumerate IPsec

ESP, AH, IKE, to secure VPN endpoints pull encryption , hashing, authentication type and key distro algorithm

Digital signatures

Modern systems include digital signatures that help with DNS zone restriction.

TCP 135 RPC

Port 135 is used by the Remote Procedure Call service in Windows for client-server communications.

Split DNS

Splitting the DNS into internal and external groups provides an added layer of security.

SMTP Countermeasures

The most basic way to counteract Simple Mail Transfer Protocol (SMTP) exploitation is to simply ignore messages to unknown recipients instead of sending back error messages. Additionally, you'll want to configure your server to block open SMTP relaying.

Username

UID (similar to SID) above 500 for users

Run SNScan

Use SNScan, a utility that detects network SNMP devices that are vulnerable to attack.

Update SNMP

Verify that you are running the most recent version of SNMP at all times.

Creator group

Windows 2000 specific grant permissions to user in the same group as creator

Everyone

all users are members of this group wide range access to resources

Network

all users that access a system through a network are in this group provides remote users access to specific resources

Anonymous logon

anon access to resources web server/app

boy

cat

Network service

limited local machine access high level network access

Guest

limited use Windows account not enabled by default

PsTools

manage local and remote Windows systems change passwords, suspend processes, measure network performance dump event log, kill

Enumerate VoIP

uses SIP to enable voice and video over IP 2000,2001,5060,5061

LDAP Countermeasures

Hardening against Lightweight Directory Access Protocol (LDAP) enumeration can be tricky. Although blocking LDAP port 389 is an option, you can't always block ports, or you'll risk impacting your network. Blocking LDAP ports could prevent your clients from querying necessary services. The best way to secure LDAP is to review and implement the security settings and services available with your server software.

TCP 137 NetBIOS

Port 137 is used by the NetBIOS Name Server (NBNS.) NBNS is used to associate names and IP addresses of systems and services.

TCP 139 NetBIOS

Port 139 is used by the NetBIOS Session Service (SMB over NetBIOS.) SMB over NetBIOS allows you to manage connection between NetBIOS clients and applications.

TCP 21 FTP

Port 21 is used for the File Transfer Protocol (FTP). FTP is used by all operating systems to transfer files between client and server machines.

TCP 23 Telnet

Port 23 is used for the Telnet protocol/software. Telnet is used to connect to and run services on remote systems. Because of security concerns, Telnet is not used as frequently as it once was.

TCP 25 SMTP

Port 25 is used for the Simple Mail Transfer Protocol (SMTP). SMTP is used to send emails between client and server and between server and server.

TCP/UDP 3268 Global Catalog Service

Port 3268 is used by the Global Catalog Service. The Global Catalog Service is used by Windows 2000 and later systems to locate information in Active Directory.

TCP/UDP 389 LDAP

Port 389 is used by the Lightweight Directory Access Protocol (LDAP.) LDAP is an internet protocol for accessing distributed directory service. If this port is open, it indicates that Active Directory or Exchange may be in use.

TCP 445 SMB over TCP

Port 445 is used by SMB over TCP. SMB over TCP also known as Direct Host is a service used to improve network access. This service is available in Windows 2000 and newer.

TCP 53 DNS

Port 53 is used for DNS zone transfers. DNS zone transfer is the process of transferring a copy of the DNS zone file from the primary DNS server to a secondary DNS server. Zone transfers are designed to provide updated network and access information to the DNS servers.

UDP 53 DNS

Port 53 is used for UDP queries about IP-to-name and name-to-IP mappings.

TCP 80 HTTP

Port 80 is used for Hypertext Transport Protocol. HTTP is used by all web browsers and most web applications.

UDP 161 and 162 SNMP

Ports 161 and 162 are used by the Simple Network Management Protocol (SNMP.) SNMP is a standard method of managing devices and software from most manufacturers.

Remove SNMP agent

Remove the SNMP agent or turn off the SNMP service completely.

Perform DNS zone transfer

copy of DNS zone file from primary to secondary designed to provide updated network/access info to DNS servers hacker pretends to be client, sends zone transfer request to DNS server, server then sends portion of database

SuperScan

enumerate info from Windows host NetBIOS, services, NULL session, trusted domains, MAC, logon, policies, users, groups

Local service

high level local machine access limited network access

Retrieve system polices

how security matters are handled

Enumerate RPC

identify any vuln services on service ports nmap nmap -sR IP/network nmap -T4 -A IP/network

Finger

info about a user finger -s username finger -s (all users) finger -l user@host (all remote users)

attack directory services

input verification deficiencies thus brute force attacks automated

Exploit SNMP

manage routers, hubs, switches agent and client public and private access public may include default passwords Application layer 7

Groups

manages permissions and rights GID /etc/passwd default primary group can be assigned secondary groups (/etc/group)

Administrator

many changes user accounts are default now

enumeration

method of gathering information from a system to learn about its config software and services

NULL session

no credentials for Windows system exploited to find users, groups, machines, shares, host SIDs net use //hostname/ipc$ \\hostname\ipc$"" /user:"" net view \\hostname net use s:\\hostname\shared folder name

Batch

run scheduled batch tasks

Exploit SMTP

scanning tools and commands can verify specific email recon

SID

security identifier when user object created gets SID cannot be used again 500 built in admin 501 built in guest Stored in SAM in LM and NTLM hash format

dns split

split DNS into internal/external groups

Creator owner

the file or directory creator is a member of this group post 2000, use to grant permissions to creator of file/directory

System

unlimited local machine access

/etc/passwd

username and UID encrypted passwords GID


Related study sets

Computer Networks/Cyber Security 330

View Set

Praxis II: Music: Content and Instruction (5114)

View Set

Human Growth and Development Final

View Set

Training and Development - Chapter 5

View Set

AP Human Geography - Unit 2 TEST STUDY GUIDE

View Set

Chapter 15: The Statute of Frauds

View Set

Transitional Devices (Connecting Words)

View Set

Practice Questions XCEL (Section 4-6 (14-16))

View Set