Footprinting Methodology

Ace your homework & exams now with Quizwiz!

Steve, an attacker, wants to track the most shared content that belongs to the target organization. For this purpose, he used an advanced social search engine that displayed shared activity across all major social networks including Twitter, Facebook, LinkedIn, Google Plus, and Pinterest. What is the tool employed by Steve in the above scenario? Vindicate Robber Wireshark BuzzSumo

Buzzsomo

Wireshark

Captures and analyzes network traffic on a computer network.

Vindicate

Detects LLMNR/NBNS/mDNS name service spoofing for network security.

Which of the following deep and dark web searching tools helps an attacker obtain information about official government or federal databases and navigate anonymously without being traced? Whitepages ExoneraTor Spokeo Been Verified

ExoneraTor- deep and dark web searching tool

Robber

Finds executables vulnerable to DLL hijacking.

BuzzSumo

Finds the most shared content across major social networks for a topic, author, or domain.

Which of the following techniques is used to create complex search engine queries? Google hacking Bing search DuckDuckGo Yahoo search

Google hacking- advanced Google search operators

Which of the following Google advanced search operators is useful to find pages containing the specific keyword (e.g., "VPN configuration") within the body of the webpage? before after intext site

Intext

Which of the following DNS record type helps in DNS footprinting to determine a domain's mail server? CNAME NS MX A

MX

Reverse Lookup

Performs reverse IP lookups to find DNS PTR records.

Jude, a professional hacker, targeted an organization's web server. Jude wanted to extract the information removed from older copies or archived links of the target website. For this purpose, he employed an exploration tool that assisted him in retrieving the archived URLs of the target website. Identify the tool employed by Jude in the above scenario. Burp Suite Gephi Netcraft Photon

Photon

Which of the following tools allows attackers to retrieve archived URLs of a target website from archive.org? Photon SecurityTrails Burp Suite Sublist3r

Photon

Netcraft

Provides internet security services, including anti-fraud, anti-phishing, and application testing.

acob, a professional hacker, targeted an organization's website to find a way into its network. To achieve his goal, he employed a footprinting tool that helped him in gathering confidential files and other relevant information related to the target website from public source-code repositories. Identify the footprinting tool employed by Jacob in the above scenario. Netcraft Reverse Lookup ShellPhish Recon-ng

Recon-ng

Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting Results matching all words in the query Results for matches on target.com and Marketing.target.com that include the word "accounting" Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting Results matching "accounting" in domain target.com but not on the site Marketing.target.com

Results matching "accounting" in domain target.com but not on the site Marketing.target.com

GFI LanGuard

Scans and fixes security vulnerabilities in networks and connected devices.

KFSensor

A Windows‑based honeypot IDS that simulates vulnerable services to detect attackers.

SearchSploit

A command-line tool for searching a local copy of Exploit‑DB, allowing offline exploit lookups.

OpenVAS

A framework for comprehensive vulnerability scanning and management.

ShellPhish

A phishing tool for stealing credentials from social media platforms.

Recon-ng

A reconnaissance framework for quickly gathering information, including from public code repositories.

Gephi

A tool for visualizing and exploring graphs and networks, including social connections.

Which of the following types of DNS records points to a host's IP address? HINFO TXT NS A

A- Points to a host's IP address

DroidSniff

An Android app that captures social media accounts over insecure wireless networks.

Burp Suite

An integrated platform for testing web application security, from mapping to exploiting vulnerabilities.

Spyse

An online platform for collecting and analyzing information about internet‑exposed devices and websites.

Nikto

An open‑source scanner that tests web servers for dangerous files, outdated versions, and known vulnerabilities.

site

restricts search results to the specified site or domain.

Sean works as a professional ethical hacker and penetration tester. He is assigned a project for information gathering on a client's network. He started penetration testing and was trying to find out the company's internal URLs, looking for any information about the different departments and business units. Sean was unable find any information. What should Sean do to get the information he needs? Sean should use WayBackMachine in Archive.org Sean should use email tracking tools Sean should use Sublist3r tool Sean should use website mirroring tools

Sean should use Sublist3r tool- python script designed to enumerate subdomains of websites using OSINT.

Which of the following tools is a command-line search tool for Exploit-DB that allows taking a copy of the Exploit database for remote use? Spyse Spokeo SearchSploit DroidSniff

SearchSploit

Which of the following activities of a user on social networking sites helps an attacker footprint or collect the identity of the user's family members, the user's interests, and related information? Maintaining the profile Playing games and joining groups Creating events Sharing photos and videos

Sharing photos and videos

Sean works as a penetration tester in ABC firm. He was asked to gather information about the target company. Sean begins with social engineering by following the steps: Secretly observes the target to gain critical information Looks at employee's password or PIN code with the help of binoculars or a low-power telescope Based on the above description, identify the social engineering technique. Phishing Shoulder surfing Dumpster diving Tailgating

Shoulder surfing- Watching over someone's shoulder as they enter information into a device

Which of the following tools allows attackers to search for people belonging to the target organization? Netcraft Spokeo GFI LanGuard OpenVAS

Spokeo- people‑search service attackers can use to find individuals in a target organization

James, a professional hacker, targeted the employees of an organization to establish footprints in their network. For this purpose, he employed an online reconnaissance tool to extract information on individuals belonging to the target organization. The tool assisted James in obtaining employee information such as phone numbers, email addresses, address history, age, date of birth, family members, and social profiles. Identify the tool employed by James in the above scenario. KFSensor Spokeo Nikto Photon

Spokeo- ppl search tool gathers personal info

Which of the following search engine tools helps an attacker use an image as a search query and track the original source and details of images, such as photographs, profile pictures, and memes? Intelius Sublist3r TinEye Mention

TinEye- Reverse image search

Photon

Used to gather archived URLs of a target site from archive.org.

Identify the Google advanced search operator that can be used to find information about ransomware incidents that occurred prior to the specified date. before cache after allinanchor

before

intext

displays the results containing the specific keyword within the body of the webpage.

before

filters search results to include only content published before a specified date.

after

finds information that was published after a certain date.

Which of the following web services provides useful information about a target company, such as the market value of the company's shares, company profile, and competitor details? dice.com investing.com linkup.com indeed.com

investing.com

Which Google search query will search for any files a target certifiedhacker.com may have? site: certifiedhacker.com ext:xml || ext:conf || ext:cnf || ext:reg || ext:inf || ext:rdp || ext:cfg || ext:txt || ext:ora || ext:ini site: certifiedhacker.com intext:xml | intext:conf | intext:cnf | intext:reg | intext:inf | intext:rdp | intext:cfg | intext:txt | intext:ora | intext:ini allinurl: certifiedhacker.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini site: certifiedhacker.com filetype:xml | filetype:conf | filetype:cnf | filetype:reg | filetype:inf | filetype:rdp | filetype:cfg | filetype:txt | filetype:ora | filetype:ini

site: certifiedhacker.com filetype:xml | filetype:conf | filetype:cnf | filetype:reg | filetype:inf | filetype:rdp | filetype:cfg | filetype:txt | filetype:ora | filetype:ini


Related study sets

Capitalization 3-Which word is incorrectly capitalized?

View Set

Unit 10: Practice Exam 1 (Investment Company)

View Set

Ch. 23: Health Assessment of Children

View Set

PSYC TEST 3: launchpad questions: module 36, 37, 38, 39

View Set

Module 4 Study Questions NUR110 Mental Health

View Set

Chapter 16 The Civil War; Section 1 The War Begins, ( From Textbook ; U.S History, Begginings to 1914")

View Set