Adversary Lifecycle and Reconnaissance Techniques
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of information about the victim's network topology can adversaries gather for targeting purposes?

  • Employee names in the victim's organization
  • Physical and logical arrangement of network environments (correct)
  • User passwords used in the victim's network
  • Specific software versions used by the victim
  • Which tool can be used for vulnerability scans on the victim's network?

  • OpenVAs (correct)
  • Microsoft Word
  • Google Chrome
  • Adobe Photoshop
  • How can adversaries utilize gathered IP addresses during targeting?

  • To derive organizational size and physical location (correct)
  • To hack into the victim's social media accounts
  • To order products online using victim's identity
  • To send friendly emails to the victims
  • What kind of information might public IP addresses reveal about a victim?

    <p>Organizational size and physical location</p> Signup and view all the answers

    Which aspect of network topology might adversaries focus on for gathering information?

    <p>Arrangement of internal network environments</p> Signup and view all the answers

    Which tool can be used to discover IP addresses in a network?

    <p>nmap -sP target_ip_range</p> Signup and view all the answers

    What type of reconnaissance involves adversaries probing victim infrastructure via network traffic?

    <p>Active scanning</p> Signup and view all the answers

    Which phase of the adversary lifecycle involves finding weak points and preparing for actions like sending phishing attempts?

    <p>Initial Access</p> Signup and view all the answers

    Which form of reconnaissance does not involve direct interaction with the victim infrastructure?

    <p>Passive scanning</p> Signup and view all the answers

    What is the primary purpose of active reconnaissance scans by adversaries?

    <p>To gather information for targeting</p> Signup and view all the answers

    How do hackers typically leverage information gathered during reconnaissance for post-compromise objectives?

    <p>To send phishing attempts</p> Signup and view all the answers

    What is the goal of adversaries using public DBs or websites providing OSINT services during the reconnaissance phase?

    <p>To gather information for planning Initial Access</p> Signup and view all the answers

    What is the main difference between active and passive reconnaissance scans?

    <p>Active scans involve probing network traffic, while passive scans do not involve direct interaction.</p> Signup and view all the answers

    What is the purpose of scanning IP blocks during network reconnaissance?

    <p>To check the compatibility of target host/application with specific exploits.</p> Signup and view all the answers

    What is the goal of wordlist scanning during network reconnaissance?

    <p>To identify content and infrastructure rather than valid credentials.</p> Signup and view all the answers

    Why do adversaries scan victims for vulnerabilities during reconnaissance?

    <p>To gather information for targeting purposes.</p> Signup and view all the answers

    How do adversaries typically check for vulnerabilities in a target host/application?

    <p>By scanning for misconfigurations or outdated software versions.</p> Signup and view all the answers

    What distinguishes wordlist scanning from brute force attacks during reconnaissance?

    <p>Wordlist scans focus on identifying valid credentials, while brute force attacks aim to uncover content and infrastructure.</p> Signup and view all the answers

    Study Notes

    Reconnaissance and Active Scanning

    • Adversaries use active reconnaissance scans to gather information about victims during targeting
    • Active scans involve probing victim infrastructure via network traffic, unlike passive scans
    • Scanning IP blocks can help adversaries gather information about victims, including IP addresses allocated to organizations by block or range

    Vulnerability Scanning

    • Adversaries use vulnerability scans to identify potential vulnerabilities in victims' systems
    • Scans check if target host/application configurations (e.g., software and version) align with specific exploits
    • Tools like OpenVAs, Nessus, and Metasploit can be used for vulnerability scans

    Wordlist Scanning

    • Adversaries use wordlist scanning to identify content and infrastructure using brute-forcing and crawling techniques
    • Wordlists may contain generic, commonly used names and file extensions or terms specific to software
    • Gathered information can be used to plan and execute Initial Access, scope and prioritize post-compromise objectives, or drive further Reconnaissance efforts

    Network Information Gathering

    • Adversaries gather information about network topology, including physical and logical arrangements of external-facing and internal network environments
    • Information gathered may include network devices (gateways, routers, etc.) and other infrastructure details
    • Tools like nmap can be used to gather network information, including IP addresses

    IP Address Gathering

    • Adversaries gather information about victims' IP addresses, including allocated IP addresses and usage details
    • IP addresses can reveal information about organizational size, physical location, Internet service provider, and publicly-facing infrastructure hosting

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about how adversaries leverage gathered information in various phases of the adversary lifecycle, including planning Initial Access and post-compromise objectives. Explore active reconnaissance scanning techniques and the use of gathered information in driving further Reconnaissance efforts.

    More Like This

    Use Quizgecko on...
    Browser
    Browser