Podcast
Questions and Answers
What is the primary purpose of reconnaissance in an attacker's strategy?
What is the primary purpose of reconnaissance in an attacker's strategy?
- To discover the location of the organization
- To set the stage for all future attacks (correct)
- To create a detailed report for stakeholders
- To execute the attack as quickly as possible
Which category of data includes information such as DNS records and antivirus software used?
Which category of data includes information such as DNS records and antivirus software used?
- Technical Data (correct)
- Geographic Information
- Financial Intelligence
- Human Intelligence
Which of the following is considered a method for obtaining reconnaissance data?
Which of the following is considered a method for obtaining reconnaissance data?
- Avoiding interaction with the target
- Active reconnaissance (correct)
- Publicly posting inquiries about the organization
- Relying solely on user feedback
What type of data is derived from understanding the major departments within an organization?
What type of data is derived from understanding the major departments within an organization?
Which source of reconnaissance data involves interactions with people to gather intelligence?
Which source of reconnaissance data involves interactions with people to gather intelligence?
What differentiates advanced attackers from less capable attackers during reconnaissance?
What differentiates advanced attackers from less capable attackers during reconnaissance?
Which of the following best describes passive reconnaissance?
Which of the following best describes passive reconnaissance?
Which of the following types of data is not classified as technical?
Which of the following types of data is not classified as technical?
What does the Mail Exchange (MX) record indicate?
What does the Mail Exchange (MX) record indicate?
Which record returns an alias for another host record?
Which record returns an alias for another host record?
What method can be used to harvest DNS names from websites?
What method can be used to harvest DNS names from websites?
Why might an organization have different DNS zones for internal and external use?
Why might an organization have different DNS zones for internal and external use?
What does DNS cache snooping allow an attacker to do?
What does DNS cache snooping allow an attacker to do?
What technology does the Sender Policy Framework (SPF) utilize?
What technology does the Sender Policy Framework (SPF) utilize?
What is the benefit of passive reconnaissance?
What is the benefit of passive reconnaissance?
What is a potential risk when DNS servers allow recursive queries?
What is a potential risk when DNS servers allow recursive queries?
Which of the following is NOT included in the baseline of technical data for a target organization?
Which of the following is NOT included in the baseline of technical data for a target organization?
What type of record returns a CNAME record for a given IP address?
What type of record returns a CNAME record for a given IP address?
Which organization is associated with the American Registry for Internet Numbers?
Which organization is associated with the American Registry for Internet Numbers?
What does an Autonomous System (AS) number uniquely identify?
What does an Autonomous System (AS) number uniquely identify?
What is the primary purpose of the Border Gateway Protocol (BGP)?
What is the primary purpose of the Border Gateway Protocol (BGP)?
Which of the following types of information is NOT typically derived from DNS records?
Which of the following types of information is NOT typically derived from DNS records?
Which organization would manage network allocation in the Asia Pacific region?
Which organization would manage network allocation in the Asia Pacific region?
What should be verified about networks during passive reconnaissance?
What should be verified about networks during passive reconnaissance?
What is the main benefit of using historical geodata for tracking individuals?
What is the main benefit of using historical geodata for tracking individuals?
Which tool is mentioned for extracting geolocation metadata from images?
Which tool is mentioned for extracting geolocation metadata from images?
What capability does Warvox offer in terms of telephone reconnaissance?
What capability does Warvox offer in terms of telephone reconnaissance?
What can geo-IP data identify?
What can geo-IP data identify?
How does technology advancement in reconnaissance impact the method of telephone monitoring?
How does technology advancement in reconnaissance impact the method of telephone monitoring?
What is the primary reason for starting a port scan with a 'slow and low' approach?
What is the primary reason for starting a port scan with a 'slow and low' approach?
What should be considered when choosing the order of scans for a target organization?
What should be considered when choosing the order of scans for a target organization?
Why might one choose to perform multiple scans on a target organization?
Why might one choose to perform multiple scans on a target organization?
Which service is commonly sought after during web service enumeration?
Which service is commonly sought after during web service enumeration?
What technology is often implemented for remote access in organizations?
What technology is often implemented for remote access in organizations?
If no remote services are available after a scan, what should be the next attack strategy?
If no remote services are available after a scan, what should be the next attack strategy?
What is the primary purpose of the information gathered from port scanning?
What is the primary purpose of the information gathered from port scanning?
What benefit does using a proxy or bounce box provide during scanning?
What benefit does using a proxy or bounce box provide during scanning?
What is the primary advantage of using historical geodata?
What is the primary advantage of using historical geodata?
Geo-IP data can be used to identify a specific IP address's geographic region.
Geo-IP data can be used to identify a specific IP address's geographic region.
What is the purpose of using tools like Geostalker?
What is the purpose of using tools like Geostalker?
The tool used to automate phone dialing and perform reconnaissance more efficiently is called ___ .
The tool used to automate phone dialing and perform reconnaissance more efficiently is called ___ .
Match the following tools with their functions:
Match the following tools with their functions:
Which record type is used to indicate the mail servers for a target domain?
Which record type is used to indicate the mail servers for a target domain?
A Pointer Record (PTR) is used to indicate legitimate mail sources for a domain.
A Pointer Record (PTR) is used to indicate legitimate mail sources for a domain.
What is the purpose of Domain Harvesting in the context of reconnaissance?
What is the purpose of Domain Harvesting in the context of reconnaissance?
The _______________ is used to help fight spam by indicating legitimate mail sources for a domain.
The _______________ is used to help fight spam by indicating legitimate mail sources for a domain.
Match the types of DNS records with their functions:
Match the types of DNS records with their functions:
What is a potential benefit of DNS Cache Snooping?
What is a potential benefit of DNS Cache Snooping?
Organizations always have separate domain names for internal and external systems.
Organizations always have separate domain names for internal and external systems.
Name one tool that can be used for harvesting domain names.
Name one tool that can be used for harvesting domain names.
What type of scan is recommended if the target organization is likely to have defenses against detection?
What type of scan is recommended if the target organization is likely to have defenses against detection?
Using a proxy or bounce box during scanning is considered a precautionary measure.
Using a proxy or bounce box during scanning is considered a precautionary measure.
What is the main purpose of the information gathered from port scanning?
What is the main purpose of the information gathered from port scanning?
Many organizations are utilizing ___________ to provide remote access services.
Many organizations are utilizing ___________ to provide remote access services.
Match the following scanning approaches with their appropriate use case:
Match the following scanning approaches with their appropriate use case:
If a target organization has no remote services available, which strategy should be changed to?
If a target organization has no remote services available, which strategy should be changed to?
Port scanning does not set off any alarms in most organizations due to automated programs constantly scanning.
Port scanning does not set off any alarms in most organizations due to automated programs constantly scanning.
What is indicated if a target organization has a remote access service such as a VPN?
What is indicated if a target organization has a remote access service such as a VPN?
What is the main difference between an iterative and recursive DNS query?
What is the main difference between an iterative and recursive DNS query?
The Border Gateway Protocol (BGP) is responsible for the centralized exchange of routing information.
The Border Gateway Protocol (BGP) is responsible for the centralized exchange of routing information.
What is the typical approach for a BGP configuration regarding Internet Service Providers?
What is the typical approach for a BGP configuration regarding Internet Service Providers?
A ______ query occurs when a DNS server asks other DNS servers for the answer and returns the result directly to the client.
A ______ query occurs when a DNS server asks other DNS servers for the answer and returns the result directly to the client.
Match the following concepts with their descriptions:
Match the following concepts with their descriptions:
Which of the following web systems can be identified that might provide useful information on target organizations?
Which of the following web systems can be identified that might provide useful information on target organizations?
Ports 80 and 443 are commonly scanned for identifying web services.
Ports 80 and 443 are commonly scanned for identifying web services.
Which command shows BGP information for a specific IP address?
Which command shows BGP information for a specific IP address?
What command can be used to extract HTTP-related services from an nmap scan output?
What command can be used to extract HTTP-related services from an nmap scan output?
Firewalls typically have identical configurations to ensure no vulnerabilities exist.
Firewalls typically have identical configurations to ensure no vulnerabilities exist.
Why is port scanning considered an essential technique in identifying systems and services?
Why is port scanning considered an essential technique in identifying systems and services?
Geolocation data can include __________, geo-IP data, and GPS data.
Geolocation data can include __________, geo-IP data, and GPS data.
Match the types of geolocation data to their descriptions:
Match the types of geolocation data to their descriptions:
Metadata from digital photos rarely includes GPS coordinates.
Metadata from digital photos rarely includes GPS coordinates.
What option in nmap is used for service versioning and identification?
What option in nmap is used for service versioning and identification?
What is the purpose of using theharvester in the context of web systems identification?
What is the purpose of using theharvester in the context of web systems identification?
Flashcards are hidden until you start studying
Study Notes
Reconnaissance Introduction
- Reconnaissance is the essential first step in penetrating an organization.
- Advanced attackers dedicate significant time to reconnaissance, exploring all vulnerabilities.
- Reconnaissance data is categorized as technical and non-technical, and gathered from physical and cyber sources.
- Active reconnaissance involves actions detectable by the target organization.
- Passive reconnaissance utilizes sources not owned by the target, making detection harder.
Data Categories
- Technical Data includes:
- Internet-routable subnets used by the organization.
- Antivirus software employed by the organization.
- Domain Name Service (DNS) records associated with the organization.
- Non-Technical Data includes:
- Geographical locations of the organization.
- Key departments within the organization.
- Important personnel and their titles.
Data Sources
- Physical Sources include:
- Open-source intelligence (OSINT)
- Financial intelligence (FININT)
- Human intelligence (HUMINT)
Technical Data
- Internet Registry Information: Includes Whois data, registered and actively used subnets.
- DNS Information and Records: Provides valuable technical insights.
- Routing and Border Protocol (BGP) Information: Reveals network routing paths and connectivity.
- Username and Email Formats: Assists in social engineering and phishing attempts.
- Remote Access and Login Systems: Identifies potential entry points for attackers.
- Specific Technologies: Reveals security measures in place, such as firewalls, routers, and antivirus software.
- Public Data Sets: Analisis of public data sets can yield valuable information about the target organization.
Registrant Information
- Includes Whois details, IPV4 and IPV6 address allocations, Autonomous System (AS) number allocations, and DNS reverse record delegation.
- Organizations register in different registries depending on their location, such as ARIN (American Registry for Internet Numbers) and AfriNIC (African Network Information Center).
Network Allocation
- IPV4 and IPV6 addresses assigned to customers are listed under the "Networks" heading.
- IP addresses can be unused by organizations.
Autonomous Systems
- AS numbers identify IP address ranges or subnets using a 16-bit or 32-bit number.
- These IP addresses are commonly used by Border Gateway Protocol (BGP).
- BGP ensures communication between network hosts, identifying alternative paths if routing fails.
DNS Information and Records
- Domain Name System (DNS) provides valuable technical and non-technical information.
- Key DNS records include:
- Start of Authority (SOA): Identifies name servers and domain administrators.
- Mail Exchange (MX): Indicates mail servers for sending mail to the domain.
- Pointer Records (PTR): Returns a CNAME record for a given IP address.
- Canonical Name Records (CNAME): Returns an alias for another host record.
- AAAA: The host record for the IPv6 address.
- TXT: Text or arbitrary "human-readable" data.
- Sender Policy Framework (SPF): Indicates legitimate mail sources for a domain to combat spam.
Domain Harvesting
- Identifying all potential hosts within a target domain.
- Tools like dnsrecon and theharvester scrape Google and other data sources for domain names.
DNS Zones
- Organizations may have separate DNS zones and servers for internal and external uses.
- External DNS records may not fully reflect internal network infrastructure.
DNS Cache Snooping
- Enumerates websites and systems requested by users or systems at the target organization.
- Requires a DNS server configured to allow recursive queries.
Port Scanning
- Techniques for discovering open ports and services on a target network.
- Types of scans include:
- Slow and Low: Used when stealth is crucial.
- Hard and Fast: Employed when detection is less likely.
- Information from port scanning informs spear-phishing strategies.
Web Service Enumeration
- Identifies remote access services and other services on a target network.
- Organizations often use SSL/web VPN systems, web email access, or portals for remote access.
Real-Time and Historical Geodata
- Valuable for targeting individuals remotely or determining their location at specific times.
- Tools like Geostalker gather geolocation metadata from images shared online.
Data from the Phone System
- VoIP technology enables automated scanning of phone numbers.
- Tools like Warvox facilitate mass phone scanning, sort and analyze data, and enable listening to phone call recordings.
DNS Records
- DNS Records contain information about a domain, such as its name servers, mail servers, and IP address.
- Start of Authority (SOA) records specify the authoritative name server for a domain, along with contact information for the administrator.
- Mail Exchange (MX) records define the mail servers responsible for handling email for the domain.
- Pointer (PTR) records provide the CNAME record associated with a specific IP address.
- Canonical Name (CNAME) records act as aliases for other host records.
- AAAA Records are used to store IPv6 addresses.
- TXT Records store text data that is human-readable.
- Sender Policy Framework (SPF) records indicate authorized mail sources for a domain to combat spam.
Domain Harvesting
- Domain harvesting involves collecting domain names associated with a target organization.
- Tools like dnsrecon and theharvester can scrape Google and other online sources for domain names.
- Theharvester can also collect email addresses, phone numbers, and other information.
DNS Zones
- Organizations often maintain separate DNS zones and servers for internal and external network traffic.
- Different DNS zones can result in different responses for the same domain name, depending on the query source.
- Third-party vendors may also host domain names for organizations.
DNS Cache Snooping
- DNS cache snooping allows enumeration of websites and systems accessed by users or systems within an organization.
- Recursive Queries occur when a DNS server contacts other servers to resolve a request and returns the answer to the client.
- Iterative Queries involve the DNS server providing a list of other DNS servers that the client can query directly.
- For cache snooping, the DNS server must be configured to allow recursive queries.
Border Gateway Protocol (BGP)
- BGP is the primary routing protocol for the internet, enabling decentralized and dynamic exchange of routing information.
- Organizations with multiple internet service provider (ISP) connections often prioritize one connection, with the other serving as backup.
- This configuration means that firewalls protecting the organization might have different settings, potentially leading to variations in security levels.
- Commands such as "show ip bgp" can help reveal BGP configurations.
System and Service Identification
- Port scanning and ping sweeps are essential for identifying systems and services exposed to the internet.
- Nmap is a versatile tool for port scanning, offering different scan modes for various levels of stealth.
- Slow and low scans are more stealthy, while hard and fast scans are faster but more likely to be detected.
- The information gained from port scanning can guide subsequent attack phases, such as spear phishing.
Web Service Enumeration
- Web service enumeration involves identifying web services running on a target network.
- Common web service ports include 80 (HTTP), 443 (HTTPS), and 8080.
- Nmap and grep can be used to analyze port scan results for web services.
Web Service Exploration
- Web cloning can create copies of websites for gathering information or launching attacks.
- Identifying web services can reveal valuable information about the target organization, such as remote access systems, teleconference tools, and administrative systems.
- Web service identification and version enumeration can be performed with Nmap's
–A
option.
Geolocation Information
- Geolocation data provides information about the physical location of assets associated with a target organization.
- Geolocation data sources include:
- Geo-metadata: GPS coordinates embedded in digital photos.
- Geo-IP data: Location associated with specific IP addresses.
- GPS data: Real-time or historical location data from GPS devices.
- Non-technical sources like social media posts can also reveal location information.
Data from the Phone System
- VoIP technology enables automated scanning of phone numbers for reconnaissance.
- Warvox is a tool that provides a web interface for automated VoIP scanning, supporting multiple phone lines and service providers.
- Warvox capabilities include:
- Scanning numerous numbers simultaneously.
- Sorting and analyzing call data.
- Listening to audio from captured calls.
- VoIP scanning can help identify internal systems and provide data on employee availability.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.