Footprinting, Scanning, and Enumeration Philip Robbins September - - PowerPoint PPT Presentation

footprinting scanning and enumeration
SMART_READER_LITE
LIVE PREVIEW

Footprinting, Scanning, and Enumeration Philip Robbins September - - PowerPoint PPT Presentation

ISA 330 Introduction to Proactive System Security Week #3 Footprinting, Scanning, and Enumeration Philip Robbins September 28, 2013 Information Security & Assurance Program University of Hawai'i West Oahu 1 Footprinting, Scanning, and


slide-1
SLIDE 1

ISA 330 Introduction to Proactive System Security Philip Robbins – September 28, 2013

Information Security & Assurance Program University of Hawai'i West Oahu Week #3

1

Footprinting, Scanning, and Enumeration

slide-2
SLIDE 2

2

Footprinting, Scanning, and Enumeration

Topics

  • Review Quiz #1
  • Class Tools (VB, BT5r3 & MS2)
  • Footprinting
  • Port Scanning
  • Enumeration
  • Quiz #2
  • Assignment #2
slide-3
SLIDE 3

3

Class Tools

Creating a local virtual test environment…

Install BT5R3 and MS2 VM on Oracle VirtualBox.

Backtrack 5R3

user: root password: toor

Metasploitable 2.0

user: msfadmin password: msfadmin

slide-4
SLIDE 4

4

Install VirtualBox

slide-5
SLIDE 5

5

Install VirtualBox

slide-6
SLIDE 6

6

Install Metasploitable 2.0

slide-7
SLIDE 7

7

Install Metasploitable 2.0

slide-8
SLIDE 8

8

Install Metasploitable 2.0

slide-9
SLIDE 9

9

Install Metasploitable 2.0

slide-10
SLIDE 10

10

Install Metasploitable 2.0

slide-11
SLIDE 11

11

Metasploitable 2.0 (MS2)

slide-12
SLIDE 12

12

Metasploitable 2.0

slide-13
SLIDE 13

13

Install Backtrack 5R3

slide-14
SLIDE 14

14

Install Backtrack 5R3

slide-15
SLIDE 15

15

Install Backtrack 5R3

slide-16
SLIDE 16

16

Install Backtrack 5R3

slide-17
SLIDE 17

17

Install Backtrack 5R3

slide-18
SLIDE 18

18

Install Backtrack 5R3

slide-19
SLIDE 19

19

Backtrack (BT5R3)

slide-20
SLIDE 20

20

Anatomy of an Attack

Perform Reconnaissance Scan Target Network  Research Vulnerabilities Perform Attack Create Backdoor Enumerate Network Exfiltrate Cover Tracks

slide-21
SLIDE 21

21

Footprinting

  • Reconnaissance

‐ The process of gathering information on a company’s network. ‐ Nonintrusive (Passive) Profiling v.s. Active Profiling What kind of information? ‐ Weaknesses in security posture ‐ Remote access capabilities ‐ Domain Names ‐ IP addresses ‐ Networking Protocols / Services ‐ User information, logins, telephones numbers, etc.

With just a URL, you can determine which Web server and OS a company is using; learn the names of employees.

slide-22
SLIDE 22

22

Reconnaissance

  • http://groups.google.com

Identify corporate email addresses for employees.

slide-23
SLIDE 23

23

Reconnaissance

  • whois

http://www.whois.net/ Gather IP and domain information.

slide-24
SLIDE 24

24

Reconnaissance

  • whois

http://www.whois.net/

slide-25
SLIDE 25

25

Reconnaissance

  • Web Data Extractor

http://www.rafasoft.com/ Extract contact data, such as email, phone, and fax information, from selected target.

slide-26
SLIDE 26

26

Reconnaissance

  • Web Data Extractor

http://www.rafasoft.com/

slide-27
SLIDE 27

27

Reconnaissance

  • FOCA

http://www.informatica64/FOCA Extract metadata from documents on Websites to reveal the document creator’s network logon and email address.

slide-28
SLIDE 28

28

Reconnaissance

  • FOCA

http://www.informatica64/FOCA

slide-29
SLIDE 29

29

Reconnaissance

  • SamSpade

Gather IP and domain information.

slide-30
SLIDE 30

30

Reconnaissance

  • SamSpade
slide-31
SLIDE 31

31

Reconnaissance

  • SamSpade
slide-32
SLIDE 32

32

Reconnaissance

  • Domain Name System Zone Transfers

Transfer all DNS name server records.

‐ DNS uses name servers for resolving hostnames to IP ‐ Zone Transfers enables you to see /analyze / diagram hosts on the organization’s network ‐ Use the “dig” or “host” commands

slide-33
SLIDE 33

33

Reconnaissance

  • dig (nslookup)

Tool for querying DNS name servers.

slide-34
SLIDE 34

34

Reconnaissance

  • dig ‐h
slide-35
SLIDE 35

35

Reconnaissance

  • dig

To determine the primary DNS server look for a Start of Authority (SOA) record.

slide-36
SLIDE 36

36

Reconnaissance

  • dig

Look for any: SOA, NS, MX.

slide-37
SLIDE 37

37

Reconnaissance

  • dig

Reverse lookup Specify ns Connection refused; no success. Using AFXR protocol to dig

slide-38
SLIDE 38

38

Reconnaissance

  • dig

Success!

slide-39
SLIDE 39

39

Reconnaissance

  • host

Same as dig??

slide-40
SLIDE 40

40

Reconnaissance

  • host ‐h
slide-41
SLIDE 41

41

Reconnaissance

  • host
slide-42
SLIDE 42

42

Reconnaissance

  • netcat (nc)

Used for banner grabs…

slide-43
SLIDE 43

43

Reconnaissance

  • netcat (nc)
slide-44
SLIDE 44

44

Reconnaissance

  • wget
slide-45
SLIDE 45

45

Reconnaissance

  • wget
slide-46
SLIDE 46

46

Reconnaissance

  • Andiparos

https://code.google.com/p/andiparos/downloads/list Capture Web server information and possible vulnerabilities in a Web site’s pages. (Through a Proxy)

slide-47
SLIDE 47

47

Reconnaissance

  • Web Bugs

Method of gathering information about a person visiting a web site or if an email was read.

‐ Works with cookies ‐ Embedded 1 pixel x 1 pixel image (GIF) file ‐ Invisible (matches web page background) ‐ Referenced in an <IMG> tag ‐ You have to reach out and download image (transaction logged) ‐ IP address ‐ Time accessed / viewed ‐ Type of browser ‐ Used to verify if email is valid (HTML based w/ auto image view)

slide-48
SLIDE 48

48

Reconnaissance

  • HTTP Methods (RFC‐2616, HTTP/1.1)

Gather content from web servers using HTTP methods.

‐ Hypertext Transfer Protocol (HTTP) ‐ Request / Response protocol between client (web browser) and server (web site). ‐ Port 80 ‐ GET Retrieves data ‐ HEAD Retrieves only header info of HTML doc ‐ OPTIONS Available Options ‐ TRACE Remote loopback of request message ‐ CONNECT Switch to tunneled connection (SSL) ‐ DELETE Request origin server delete identified resource ‐ PUT Request entity be stored ‐ POST Allows data to be posted

slide-49
SLIDE 49

49

Reconnaissance

  • HTTP Methods (RFC‐2616, HTTP/1.1)
slide-50
SLIDE 50

50

Reconnaissance

  • GET 192.168.56.101 (MS2)
slide-51
SLIDE 51

51

Reconnaissance

  • HEAD 192.168.56.101 (MS2)

header info of HTML doc

slide-52
SLIDE 52

52

Reconnaissance

  • Social Engineering

Psychological manipulation of people into performing actions or divulging information.

  • Shoulder Surfing

Looking over somebody’s shoulder to get information (passwords / PINs).

  • Dumpster Diving

Sifting through garbage to find information that has been discarded that may prove useful.

  • Piggybacking

A person tagging along with another person who is authorized to gain entry into a restricted area.

  • Phishing

Attempting to acquire information by masquerading as a trustworthy entity.

slide-53
SLIDE 53

53

Reconnaissance

  • Social Engineering

Psychological manipulation of people into performing actions or divulging information.

Top SE Techniques:

Urgency – “I need the info now before you know what hits the fan…” Quid pro quo – “Give me what I need and I will give you a…” Status quo – “Everyone does it, don’t worry about it…” Kindness – “Thank you so much for… giving me the keys to the kingdom” Position – “When I say jump you say how high…” Other Techniques: Familiarity Creating a hostile situation / distraction Get a job there

slide-54
SLIDE 54

54

Reconnaissance

  • Phishing

Attempting to acquire information by masquerading as a trustworthy entity.

slide-55
SLIDE 55

55

Reconnaissance

  • Phishing

Attempting to acquire information by masquerading as a trustworthy entity.

wtf…that’s not FB!

  • h hell no…
slide-56
SLIDE 56

56

Reconnaissance

  • Spear Phishing

Phishing attempts directed at specific individuals or companies.

slide-57
SLIDE 57

57

Scanning

  • Port / Service Scanning

‐ Examining a range of IP addresses to determine which services are running. ‐ Automated tools ping each port on a network computer. ‐ Remember many programs use port numbers outside the range

  • f well‐known ports.

‐ After a hacker discovers an open port / service, finding a vulnerability or exploit isn’t that difficult. ‐ Port scanning is legal. ‐ Moving away from passive to active info gathering.

slide-58
SLIDE 58

58

Scanning

  • TCP 3‐way Handshake Review

1) A ‐‐> B SYN my sequence number is X 2) A <‐‐ B ACK your sequence number is X 3) A <‐‐ B SYN my sequence number is Y 4) A ‐‐> B ACK your sequence number is Y

A B

slide-59
SLIDE 59

59

Scanning

  • Popular types of Port / Service Scans

‐ SYN Scan (nmap ‐sS)

Full TCP connection is never made; RSK/ACK always sent or received to close session. Considered a stealth scan.

‐ Connect Scan (nmap –sT)

Full TCP connection made with three‐way handshake. Connection is logged.

‐ NULL Scan (nmap –sN)

All packet flags are turned off. Expected result on an open port is no response; packet is discarded. Expected result on an closed port is a RST packet.

slide-60
SLIDE 60

60

Scanning

  • Popular types of Port / Service Scans

‐ XMAS Scan (nmap ‐sX)

FIN, PSH, URG flags are set. Expected result on an open port is no response; packet is discarded. Expected result on an closed port is a RST packet.

‐ ACK Scan (nmap –sA)

Used to get past firewalls / filtering devices. A returned RST packet indicates that the packet filter was fooled.

‐ FIN Scan (nmap –sF)

FIN packet flag is sent. Expected result on an closed port is a RST packet.

slide-61
SLIDE 61

61

Scanning

  • Popular types of Port / Service Scans

‐ UDP Scan (nmap ‐sU)

UDP packet sent to target. Expected result on an open port is an ICMP “Port Unreachable” message (not guaranteed).

slide-62
SLIDE 62

62

Scanning

  • Port / Service Scanning
slide-63
SLIDE 63

63

Reconnaissance

  • nmap

The most popular port scanning tool.

slide-64
SLIDE 64

64

Reconnaissance

  • nmap ‐h

The most popular port scanning tool.

slide-65
SLIDE 65

65

Scanning

  • nmap 192.168.56.101 (against MS2)
slide-66
SLIDE 66

66

Scanning

  • nmap –A –v 192.168.56.101 (against MS2)
slide-67
SLIDE 67

67

Scanning

  • nmap –A –v 192.168.56.101 (against MS2)
slide-68
SLIDE 68

68

Scanning

  • nmap –A –v 192.168.56.101 (against MS2)
slide-69
SLIDE 69

69

Scanning

  • nmap –A –v 192.168.56.101 (against MS2)
slide-70
SLIDE 70

70

Scanning

  • nmap –A –v 192.168.56.101 (against MS2)
slide-71
SLIDE 71

71

Scanning

  • nmap –A –v 192.168.56.101 (against MS2)
slide-72
SLIDE 72

72

Scanning

  • nmap 192.168.56.102 (against BT5R3)
slide-73
SLIDE 73

73

Scanning

  • nmap –sS ‐v 192.168.56.101 (against MS2)
slide-74
SLIDE 74

74

Scanning

  • nmap –sS ‐v 192.168.56.100‐200 (range)
slide-75
SLIDE 75

75

Reconnaissance

  • Unicornscan

Conduct tests on large networks and consolidate tools for large‐scale endeavors.

‐ Ideal for large networks. ‐ Scans 65,535 ports in 3‐7 seconds. ‐ Port scanning using TCP, ICMP, and IP. ‐ Optimizes UDP scanning.

slide-76
SLIDE 76

76

Reconnaissance

  • fping

A command‐line tool that allows you to ping multiple IP addresses simultaneously (determining which computers are “live”).

slide-77
SLIDE 77

77

Reconnaissance

  • fping ‐h

ping vs fping: specify a range

slide-78
SLIDE 78

78

Reconnaissance

  • hping

Allows you to ping sweep multiple IP addresses simultaneously while bypassing filtering devices (using modified IP packets).

slide-79
SLIDE 79

79

Reconnaissance

  • hping3 –h | less
slide-80
SLIDE 80

80

Reconnaissance

  • hping3 –h | less
slide-81
SLIDE 81

81

Reconnaissance

  • hping3 –h | less

set flags just like nmap…

slide-82
SLIDE 82

82

Enumeration

‐ Next step after port scanning. ‐ Actually connecting to the system and obtaining information about users, passwords, and shared resources. ‐ Active / intrusive v.s. Passive

slide-83
SLIDE 83

83

REVIEW: OS Vulnerabilities

  • Network Basic Input / Output System (NetBIOS)

‐ OSI Session Layer 5. ‐ Software that allows us to interact with a shared network resources or devices. ‐ NetBIOS frees an application from understanding the details

  • f a network.

‐ Still used today for ensuring backward capability. ‐ Uses ports open to the internet: UDP/137 UDP/138 TCP/139

slide-84
SLIDE 84

84

REVIEW: OS Vulnerabilities

  • Network Basic Input / Output System (NetBIOS)

Why is NetBIOs over TCP/IP considered a security risk again?

slide-85
SLIDE 85

85

REVIEW: OS Vulnerabilities

  • Network Basic Input / Output System (NetBIOS)

Why is NetBIOs over TCP/IP considered a security risk again?

slide-86
SLIDE 86

86

Enumeration

  • Network Basic Input / Output System (NetBIOS)

‐ Names have 16 char limit; 15 useable char limit. ‐ Last char reserved for service identification (00 to FF). ‐ Hackers attack Domain Controllers because of the type of info. ‐ Null Sessions (NS) is a serious vulnerability for NetBIOS systems. ‐ NS still present on Windows XP ‐ NS disabled by default in Windows Server 2003 ‐ NS not available in Windows Vista and Server 2008 ‐ NBTstat command used.

slide-87
SLIDE 87

87

Enumeration

slide-88
SLIDE 88

88

Enumeration

slide-89
SLIDE 89

89

Enumeration

  • NBTscan

NetBIOS over TCP/IP scan finds computers running NETBIOS.

slide-90
SLIDE 90

90

Enumeration

  • NBTscan
slide-91
SLIDE 91

91

Enumeration

  • nbtstat
slide-92
SLIDE 92

92

Enumeration

  • nbtstat ‐a
slide-93
SLIDE 93

93

Enumeration

  • net view

Displays a list of domains, computers, or resources that are being shared by the specified computer. Used without parameters, net view displays a list of computers in your current domain.

slide-94
SLIDE 94

94

Enumeration

  • net view
slide-95
SLIDE 95

95

Enumeration

  • net view
slide-96
SLIDE 96

96

Enumeration

  • net use

Connects a computer to or disconnects a computer from a shared resource, or displays information about computer

  • connections. Used without parameters, net use retrieves a list of network connections.
slide-97
SLIDE 97

97

Enumeration

  • net use
slide-98
SLIDE 98

98

Enumeration

  • DumpSec

Enumeration tool for Windows systems allowing users to connect to a server and “dump” permissions for shares. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares.

slide-99
SLIDE 99

99

Enumeration

  • DumpSec
slide-100
SLIDE 100

100

Enumeration

  • smb4K

Used to enumerate Windows computers on a network.

slide-101
SLIDE 101

101

Enumeration

  • smb4K
slide-102
SLIDE 102

102

Enumeration

  • finger
slide-103
SLIDE 103

103

Review Questions

  • Question #1

To find information about the key IT personnel responsible for a company’s domain, you might use which of the following tools? (Choose all that apply.)

a. Whois. b. Whatis. c. SamSpade. d. Nbtstat.

slide-104
SLIDE 104

104

Review Questions

  • Question #1

To find information about the key IT personnel responsible for a company’s domain, you might use which of the following tools? (Choose all that apply.)

a. Whois. b. Whatis. c. SamSpade. d. Nbtstat.

slide-105
SLIDE 105

105

Review Questions

  • Question #2

Which is one of the most vulnerable components to network attacks?

a. TCP/IP. b. WINS. c. DHCP. d. DNS.

slide-106
SLIDE 106

106

Review Questions

  • Question #2

Which is one of the most vulnerable components to network attacks?

a. TCP/IP. b. WINS. c. DHCP. d. DNS.

slide-107
SLIDE 107

107

Review Questions

  • Question #3

Which of the following contains host records for a domain?

a. DNS b. WINS c. Linux server d. UNIX Web Clients

slide-108
SLIDE 108

108

Review Questions

  • Question #3

Which of the following contains host records for a domain?

a. DNS b. WINS c. Linux server d. UNIX Web Clients

slide-109
SLIDE 109

109

Review Questions

  • Question #4

Which of the following enables you to view all host computers on a network?

a. SOA b. ipconfig c. Zone Transfers d. HTTP HEAD method

slide-110
SLIDE 110

110

Review Questions

  • Question #4

Which of the following enables you to view all host computers on a network?

a. SOA b. ipconfig c. Zone Transfers d. HTTP HEAD method

slide-111
SLIDE 111

111

Review Questions

  • Question #5

What’s one way to gather information about a domain?

a. View the header of an e‐mail you send to an e‐mail account that doesn’t exist. b. Use the ipconfig command. c. Use the ifconfig command. d. Connect via Telnet to TCP port 53.

slide-112
SLIDE 112

112

Review Questions

  • Question #5

What’s one way to gather information about a domain?

a. View the header of an e‐mail you send to an e‐mail account that doesn’t exist. b. Use the ipconfig command. c. Use the ifconfig command. d. Connect via Telnet to TCP port 53.

slide-113
SLIDE 113

113

Review Questions

  • Question #6

To determine a company’s primary DNS server, you can look for a DNS server containing which of the following?

a. Cname record. b. Host record. c. PTR record. d. SOA record.

slide-114
SLIDE 114

114

Review Questions

  • Question #6

To determine a company’s primary DNS server, you can look for a DNS server containing which of the following?

a. Cname record. b. Host record. c. PTR record. d. SOA record.

slide-115
SLIDE 115

115

Review Questions

  • Question #7

Which of the following tools can assist you in finding general information about an organization and its employees? (Choose all that apply.)

a.

  • www. google.com

b. http://groups.google.com c. netcat d. nmap

slide-116
SLIDE 116

116

Review Questions

  • Question #7

Which of the following tools can assist you in finding general information about an organization and its employees? (Choose all that apply.)

a.

  • www. google.com

b. http://groups.google.com c. netcat d. nmap

slide-117
SLIDE 117

117

Review Questions

  • Question #8

What’s the first method a security tester should attempt to find a password for a computer on the network?

a. Use a scanning tool. b. Install a sniffer on the network. c. Ask the user. d. Install a password‐cracking program.

slide-118
SLIDE 118

118

Review Questions

  • Question #8

What’s the first method a security tester should attempt to find a password for a computer on the network?

a. Use a scanning tool. b. Install a sniffer on the network. c. Ask the user. d. Install a password‐cracking program.

slide-119
SLIDE 119

119

Review Questions

  • Question #9

Discovering a user’s password be observing the keys he

  • r she presses is called which of the following?

a. Password hashing b. Password crunching c. Piggybacking d. Shoulder surfing

slide-120
SLIDE 120

120

Review Questions

  • Question #9

Discovering a user’s password be observing the keys he

  • r she presses is called which of the following?

a. Password hashing b. Password crunching c. Piggybacking d. Shoulder surfing

slide-121
SLIDE 121

121

Review Questions

  • Question #10

Entering a company’s restricted area by following closely behind an authorized person is referred to as which of the following?

a. Shoulder surfing b. Piggybacking c. False entering d. Social Engineering

slide-122
SLIDE 122

122

Review Questions

  • Question #10

Entering a company’s restricted area by following closely behind an authorized person is referred to as which of the following?

a. Shoulder surfing b. Piggybacking c. False entering d. Social Engineering

slide-123
SLIDE 123

123

Review Questions

  • Question #11

What social engineering technique involves telling an employee that you’re calling from the CEO’s office and need certain information ASAP?

a. Urgency b. Status quo c. Position of authority d. Quid pro quo

slide-124
SLIDE 124

124

Review Questions

  • Question #11

What social engineering technique involves telling an employee that you’re calling from the CEO’s office and need certain information ASAP?

a. Urgency b. Status quo c. Position of authority d. Quid pro quo

slide-125
SLIDE 125

125

Review Questions

  • Question #12

Security testers and hackers use which of the following to determine which services are running on a host?

a. Zone transfer b. Zone scanning c. Encryption algorithms d. Port scanning

slide-126
SLIDE 126

126

Review Questions

  • Question #12

Security testers and hackers use which of the following to determine which services are running on a host?

a. Zone transfer b. Zone scanning c. Encryption algorithms d. Port scanning

slide-127
SLIDE 127

127

Review Questions

  • Question #13

Which flags are set on a packet sent with the nmap –sX 192.168.56.101 command?

a. FIN b. PSH c. SYN d. URG

slide-128
SLIDE 128

128

Review Questions

  • Question #13

Which flags are set on a packet sent with the nmap –sX 192.168.56.101 command?

a. FIN b. PSH c. SYN d. URG

slide-129
SLIDE 129

129

Review Questions

  • Question #14

Which nmap command verifies whether the SSH port is

  • pen on any computers in the 192.168.1.0

network? (Choose all that apply.)

  • a. nmap –v 192.168.1.0-254 –p 22
  • b. nmap –v 192.168.1.0-254 –p 23
  • c. nmap –v 192.168.1.0-254 –s 22
  • d. nmap –v 192.168.1.0/24 –p 22
slide-130
SLIDE 130

130

Review Questions

  • Question #14

Which nmap command verifies whether the SSH port is

  • pen on any computers in the 192.168.1.0

network? (Choose all that apply.)

  • a. nmap –v 192.168.1.0-254 –p 22
  • b. nmap –v 192.168.1.0-254 –p 23
  • c. nmap –v 192.168.1.0-254 –s 22
  • d. nmap –v 192.168.1.0/24 –p 22
slide-131
SLIDE 131

131

Review Questions

  • Question #15

A closed port responds to a SYN packet with which of the following packets?

a. FIN b. SYN‐ACK c. SYN d. RST

slide-132
SLIDE 132

132

Review Questions

  • Question #15

A closed port responds to a SYN packet with which of the following packets?

a. FIN b. SYN‐ACK c. SYN d. RST

slide-133
SLIDE 133

133

Review Questions

  • Question #16

Which type of scan is usually used to bypass a firewall or packet‐filtering device?

a. ACK scan b. SYN scan c. XMAS scan d. FIN scan

slide-134
SLIDE 134

134

Review Questions

  • Question #16

Which type of scan is usually used to bypass a firewall or packet‐filtering device?

a. ACK scan b. SYN scan c. XMAS scan d. FIN scan

slide-135
SLIDE 135

135

Review Questions

  • Question #17

A FIN packet sent to a closed port responds with which

  • f the following packets?

a. FIN b. SYN‐ACK c. RST d. SYN

slide-136
SLIDE 136

136

Review Questions

  • Question #17

A FIN packet sent to a closed port responds with which

  • f the following packets?

a. FIN b. SYN‐ACK c. RST d. SYN

slide-137
SLIDE 137

137

Review Questions

  • Question #18

Which type of scan send a packet with all flags set to NULL?

a. NULL b. VOID c. SYN d. XMAS

slide-138
SLIDE 138

138

Review Questions

  • Question #18

Which type of scan send a packet with all flags set to NULL?

a. NULL b. VOID c. SYN d. XMAS

slide-139
SLIDE 139

139

Review Questions

  • Question #19

To bypass some ICMP‐filtering devices on a network, an attacker might send which type of packets to scan the network for vulnerable services?

a. PING packets b. SYN packets c. ACK packets d. Echo Request packets

slide-140
SLIDE 140

140

Review Questions

  • Question #19

To bypass some ICMP‐filtering devices on a network, an attacker might send which type of packets to scan the network for vulnerable services?

a. PING packets b. SYN packets c. ACK packets d. Echo Request packets

slide-141
SLIDE 141

141

Review Questions

  • Question #20

Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?

a. Tracert b. Traceroute c. Hping d. Nmapping

slide-142
SLIDE 142

142

Review Questions

  • Question #20

Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?

a. Tracert b. Traceroute c. Hping d. Nmapping

slide-143
SLIDE 143

143

Review Questions

  • Question #21

Which of the following testing processes is the most intrusive?

a. Port scanning b. Enumeration c. Null scanning d. Numeration

slide-144
SLIDE 144

144

Review Questions

  • Question #21

Which of the following testing processes is the most intrusive?

a. Port scanning b. Enumeration c. Null scanning d. Numeration

slide-145
SLIDE 145

145

Review Questions

  • Question #22

Enumeration of Windows systems can be more difficult if which port is filtered?

a. 110 UDP b. 443 UDP c. 80 TCP d. 139 TCP

slide-146
SLIDE 146

146

Review Questions

  • Question #22

Enumeration of Windows systems can be more difficult if which port is filtered?

a. 110 UDP b. 443 UDP c. 80 TCP d. 139 TCP

slide-147
SLIDE 147

147

Review Questions

  • Question #23

A null session is enabled by default in all the following versions except?

a. Windows 95 b. Windows Server 2008 c. Windows 98 d. Windows 2000

slide-148
SLIDE 148

148

Review Questions

  • Question #23

A null session is enabled by default in all the following versions except?

a. Windows 95 b. Windows Server 2008 c. Windows 98 d. Windows 2000

slide-149
SLIDE 149

149

Review Questions

  • Question #24

To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?

a. nbtscan 193.145.85.0/24 b. nbtscan 193.145.85.0‐255 c. nbtstat 193.145.85.0/24 d. netstat 193.145.85.0/24

slide-150
SLIDE 150

150

Review Questions

  • Question #24

To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?

a. nbtscan 193.145.85.0/24 b. nbtscan 193.145.85.0‐255 c. nbtstat 193.145.85.0/24 d. netstat 193.145.85.0/24

slide-151
SLIDE 151

151

Review Questions

  • Question #25

Which of the following is a Windows command‐line utility for seeing NetBIOS shares on a network?

a. net use b. net user c. net view d. nbtuser

slide-152
SLIDE 152

152

Review Questions

  • Question #25

Which of the following is a Windows command‐line utility for seeing NetBIOS shares on a network?

a. net use b. net user c. net view d. nbtuser

slide-153
SLIDE 153

153

Review Questions

  • Question #26

A NetBIOS name can contain a maximum of how many characters?

a. 10 b. 11 c. 15 d. 16

slide-154
SLIDE 154

154

Review Questions

  • Question #26

A NetBIOS name can contain a maximum of how many characters?

a. 10 b. 11 c. 15 d. 16

slide-155
SLIDE 155

155

Review Questions

  • Question #26

Which of the following commands connects to a computer containing shared files and folders?

a. net view b. net use c. netstat d. nbtstat

slide-156
SLIDE 156

156

Review Questions

  • Question #26

Which of the following commands connects to a computer containing shared files and folders?

a. net view b. net use c. netstat d. nbtstat

slide-157
SLIDE 157

157

Review Questions

  • Question #26

Which ports are most vulnerable to NetBIOS attacks?

a. 135 to 137 b. 389 to 1023 c. 135 to 139 d. 110 and 115

slide-158
SLIDE 158

158

Review Questions

  • Question #26

Which ports are most vulnerable to NetBIOS attacks?

a. 135 to 137 b. 389 to 1023 c. 135 to 139 d. 110 and 115

slide-159
SLIDE 159

159

Review Questions

  • Question #27

What is the best method of preventing NetBIOS attacks?

a. Filtering certain ports at the firewall b. Telling users to create difficult‐to‐guess passwords c. Pausing the Workstation service. d. Stopping the Workstations service.

slide-160
SLIDE 160

160

Review Questions

  • Question #27

What is the best method of preventing NetBIOS attacks?

a. Filtering certain ports at the firewall b. Telling users to create difficult‐to‐guess passwords c. Pausing the Workstation service. d. Stopping the Workstations service.

slide-161
SLIDE 161

161

Review Questions

  • Question #28 (last one)

Which of the following is a commonly used UNIX enumeration tool?

a. Netcat b. Nbtstat c. Netstat d. Finger

slide-162
SLIDE 162

162

Review Questions

  • Question #28 (last one)

Which of the following is a commonly used UNIX enumeration tool?

a. Netcat b. Nbtstat c. Netstat d. Finger

slide-163
SLIDE 163

163

Quiz #2

  • Short answer, closed book, closed notes.
slide-164
SLIDE 164

164

Questions?

probbins@hawaii.edu

www2.hawaii.edu/~probbins https://www.dorkatron.com/docs/ISA330/