Ethical Hacking Chapter 5
Nmap
A popular Port scanners that has the ability to use a GUI front end
filtered port
A port state that may indicate a firewall is being used to allow specified traffic into or out of the network
open port
A port state tht allows access to applications and can be vulnerable
closed port
A port state which does not allow entry or access to a service
port scanning
Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly
Fping
Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux
False
An open port allows access to specific applications and cannot be vulnerable to attack.
OpenVas
An open-source fork of Nessus
True
Attackers typically use scans to get past a firewall or other filtering devices.
RST
Closed ports respond to a NULL scan with what type of packet?
limit their scan speeds
If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
#!/bin/sh
In a Linux script, which of the lines in important because it identifies the file as a script?
False
In a NULL scan, all packet flags are turned on.
unfiltered
In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?
chmod+execute script_name
In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?
SYN flag
In normal TCP session, the sender sends a packet to another computer with which of the following flags set?
Nmap GUI
Nmap has a GUI front end that makes it easier to work some of the complex options by providing a GUI. Which of the following is the Nmap GUI front end?
reply
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?
ping sweep
Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
True
Port scanning is a method of finding out which services a host computer offers.
stealth
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?
Nessus
The original utility from which OpenVas was developed
ping
To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?
Hping
Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP- packets
Hping
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?
Fping
What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?
NMap
What open port-scanning tool is considered to be the standard port-scanning tool for security professionals?
OpenVAS
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?
XMAS scan
What type of port scan has the FIN, PHS, and URG flags set?
Connect
What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?
FIN
When a TCP three-way handshake endsm both parties send what type of packet to end the connection?
flag
When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?
ping sweep
When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?
A
When using the text editor vim what command appends text after the insertion point?
while
When writing a script which statement allows you to avoid creating an endless loop in your script?
customized script
Which of the following describes a flexible program that automates a task that takes too much to perform manually?
script
Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?
do
Which statement is where the script performs its main task?
Dd
Which vi command deletes the current line?
True
You can search for vulnerabilities in a host computer by using a port-scanning tool.