Podcast
Questions and Answers
What is the primary function of the Border Gateway Protocol (BGP)?
What is the primary function of the Border Gateway Protocol (BGP)?
What is the first phase that must always be performed in a reconnaissance?
What is the first phase that must always be performed in a reconnaissance?
All IP addresses assigned to organizations are actively used.
All IP addresses assigned to organizations are actively used.
False
The main difference between advanced attackers and less capable attackers is the amount of reconnaissance time spent.
The main difference between advanced attackers and less capable attackers is the amount of reconnaissance time spent.
Signup and view all the answers
What does the acronym AS stand for in the context of network allocation?
What does the acronym AS stand for in the context of network allocation?
Signup and view all the answers
Name one type of technical data that can be collected during reconnaissance.
Name one type of technical data that can be collected during reconnaissance.
Signup and view all the answers
The process of gathering DNS names from websites to identify hosts is called __________.
The process of gathering DNS names from websites to identify hosts is called __________.
Signup and view all the answers
Passive reconnaissance makes it harder for the target to ______ our activities.
Passive reconnaissance makes it harder for the target to ______ our activities.
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
What information is included in the baseline of technical data about an organization?
What information is included in the baseline of technical data about an organization?
Signup and view all the answers
Which of these is a non-technical data type collected in reconnaissance?
Which of these is a non-technical data type collected in reconnaissance?
Signup and view all the answers
DNS cache snooping can be viewed as a vulnerability.
DNS cache snooping can be viewed as a vulnerability.
Signup and view all the answers
Match the type of reconnaissance with its method:
Match the type of reconnaissance with its method:
Signup and view all the answers
What is the purpose of harvesting DNS names?
What is the purpose of harvesting DNS names?
Signup and view all the answers
Which of the following is NOT a category of data searched during reconnaissance?
Which of the following is NOT a category of data searched during reconnaissance?
Signup and view all the answers
List one source from which reconnaissance data can be obtained.
List one source from which reconnaissance data can be obtained.
Signup and view all the answers
What is the primary purpose of Cache snooping?
What is the primary purpose of Cache snooping?
Signup and view all the answers
A recursive query will only return results if the DNS server has the answer stored locally.
A recursive query will only return results if the DNS server has the answer stored locally.
Signup and view all the answers
What does BGP stand for?
What does BGP stand for?
Signup and view all the answers
In an ______ query, the DNS server provides a list of other DNS servers for further querying.
In an ______ query, the DNS server provides a list of other DNS servers for further querying.
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
Which of the following describes a potential risk of using BGP?
Which of the following describes a potential risk of using BGP?
Signup and view all the answers
Less restrictive firewalls may go unnoticed due to less attention from personnel.
Less restrictive firewalls may go unnoticed due to less attention from personnel.
Signup and view all the answers
What is one basic technique for identifying systems and services exposed to the internet?
What is one basic technique for identifying systems and services exposed to the internet?
Signup and view all the answers
What is the recommended initial approach if you believe the target organization has detection technologies in place?
What is the recommended initial approach if you believe the target organization has detection technologies in place?
Signup and view all the answers
All organizations will notice port scanning activities immediately.
All organizations will notice port scanning activities immediately.
Signup and view all the answers
What type of service mentioned is key for remote access in organizations?
What type of service mentioned is key for remote access in organizations?
Signup and view all the answers
Using a ______ box or proxy for scanning helps maintain anonymity during scans.
Using a ______ box or proxy for scanning helps maintain anonymity during scans.
Signup and view all the answers
Match the scanning approaches with their characteristics:
Match the scanning approaches with their characteristics:
Signup and view all the answers
What is the potential next step after obtaining useful information from port scanning?
What is the potential next step after obtaining useful information from port scanning?
Signup and view all the answers
The slow scanning approach follows strict rules.
The slow scanning approach follows strict rules.
Signup and view all the answers
Why might an organization want to change its attack strategy if no remote services are available?
Why might an organization want to change its attack strategy if no remote services are available?
Signup and view all the answers
Which of the following ports are commonly scanned for web services?
Which of the following ports are commonly scanned for web services?
Signup and view all the answers
Geolocation data can only be obtained from GPS systems.
Geolocation data can only be obtained from GPS systems.
Signup and view all the answers
What is a popular system used for port scanning in web service exploration?
What is a popular system used for port scanning in web service exploration?
Signup and view all the answers
GPS stands for ______.
GPS stands for ______.
Signup and view all the answers
Match the following web systems with their categorization:
Match the following web systems with their categorization:
Signup and view all the answers
Which of the following are methods for obtaining reconnaissance data?
Which of the following are methods for obtaining reconnaissance data?
Signup and view all the answers
Active reconnaissance involves activities that can possibly be detected by the target organization.
Active reconnaissance involves activities that can possibly be detected by the target organization.
Signup and view all the answers
Name one type of technical data that can be collected during reconnaissance.
Name one type of technical data that can be collected during reconnaissance.
Signup and view all the answers
Reconnaissance can be conducted using __________ sources.
Reconnaissance can be conducted using __________ sources.
Signup and view all the answers
Match the following types of reconnaissance data with their examples:
Match the following types of reconnaissance data with their examples:
Signup and view all the answers
Which of the following is an example of passive reconnaissance?
Which of the following is an example of passive reconnaissance?
Signup and view all the answers
What is the primary purpose of reconnaissance in the context of an attack?
What is the primary purpose of reconnaissance in the context of an attack?
Signup and view all the answers
Non-technical data during reconnaissance includes information related to major departments within an organization.
Non-technical data during reconnaissance includes information related to major departments within an organization.
Signup and view all the answers
Which of the following ports are commonly associated with web services?
Which of the following ports are commonly associated with web services?
Signup and view all the answers
Geolocation data can be obtained from digital photos via GPS metadata.
Geolocation data can be obtained from digital photos via GPS metadata.
Signup and view all the answers
What technology allows automated dialing of phone numbers?
What technology allows automated dialing of phone numbers?
Signup and view all the answers
The use of ______ helps identify systems and services exposed to the internet.
The use of ______ helps identify systems and services exposed to the internet.
Signup and view all the answers
Match the following web systems with their purposes:
Match the following web systems with their purposes:
Signup and view all the answers
Which of the following best describes a recursive DNS query?
Which of the following best describes a recursive DNS query?
Signup and view all the answers
BGP is primarily used for routing information exchange between multiple ISPs.
BGP is primarily used for routing information exchange between multiple ISPs.
Signup and view all the answers
What primary technique is suggested for identifying systems exposed to the internet?
What primary technique is suggested for identifying systems exposed to the internet?
Signup and view all the answers
The purpose of DNS cache snooping is to ______ websites and systems that users have requested.
The purpose of DNS cache snooping is to ______ websites and systems that users have requested.
Signup and view all the answers
Match the following DNS query types with their descriptions:
Match the following DNS query types with their descriptions:
Signup and view all the answers
What is a potential risk associated with less restrictive firewalls?
What is a potential risk associated with less restrictive firewalls?
Signup and view all the answers
Iterative queries provide a direct answer from the DNS server without additional querying.
Iterative queries provide a direct answer from the DNS server without additional querying.
Signup and view all the answers
Why is DNS server configuration critical for security?
Why is DNS server configuration critical for security?
Signup and view all the answers
What does an Autonomous System (AS) number uniquely identify?
What does an Autonomous System (AS) number uniquely identify?
Signup and view all the answers
Organizations often use the same DNS servers for both internal and external operations.
Organizations often use the same DNS servers for both internal and external operations.
Signup and view all the answers
What is a common purpose of DNS cache snooping?
What is a common purpose of DNS cache snooping?
Signup and view all the answers
The Border Gateway Protocol is commonly known as the __________ protocol of the internet.
The Border Gateway Protocol is commonly known as the __________ protocol of the internet.
Signup and view all the answers
Match the type of IP address with its corresponding description:
Match the type of IP address with its corresponding description:
Signup and view all the answers
What is the primary function of harvesting DNS names?
What is the primary function of harvesting DNS names?
Signup and view all the answers
Name one type of information included in registrant details.
Name one type of information included in registrant details.
Signup and view all the answers
All IP addresses allocated to an organization are actively in use.
All IP addresses allocated to an organization are actively in use.
Signup and view all the answers
What is a recommended scanning approach if detection technologies are suspected in the target organization?
What is a recommended scanning approach if detection technologies are suspected in the target organization?
Signup and view all the answers
Every organization is constantly being scanned by automated programs.
Every organization is constantly being scanned by automated programs.
Signup and view all the answers
What is the purpose of using a bounce box or proxy during scanning?
What is the purpose of using a bounce box or proxy during scanning?
Signup and view all the answers
If the target organization has a remote access service, we should focus on obtaining a valid set of credentials to use for __________.
If the target organization has a remote access service, we should focus on obtaining a valid set of credentials to use for __________.
Signup and view all the answers
Match the scanning approaches with their key characteristics:
Match the scanning approaches with their key characteristics:
Signup and view all the answers
Which of the following statements about the frequency of port scanning is true?
Which of the following statements about the frequency of port scanning is true?
Signup and view all the answers
The slow scanning approach operates under strict rules that must always be followed.
The slow scanning approach operates under strict rules that must always be followed.
Signup and view all the answers
What should be the next focus if no remote services are available in a target organization?
What should be the next focus if no remote services are available in a target organization?
Signup and view all the answers
What is the role of Autonomous System (AS) numbers in networking?
What is the role of Autonomous System (AS) numbers in networking?
Signup and view all the answers
Domain harvesting is a technique used to find the internal hosts of an organization.
Domain harvesting is a technique used to find the internal hosts of an organization.
Signup and view all the answers
What are the two types of IP address versions mentioned?
What are the two types of IP address versions mentioned?
Signup and view all the answers
The __________ protocol is commonly known as the routing protocol of the internet.
The __________ protocol is commonly known as the routing protocol of the internet.
Signup and view all the answers
Match the following DNS records with their purposes:
Match the following DNS records with their purposes:
Signup and view all the answers
Which type of information is contained in registrant information?
Which type of information is contained in registrant information?
Signup and view all the answers
Organizations typically do not have separate DNS zones for internal and external use.
Organizations typically do not have separate DNS zones for internal and external use.
Signup and view all the answers
What does DNS stand for?
What does DNS stand for?
Signup and view all the answers
Which of the following is a method of reconnaissance that minimizes detection risk?
Which of the following is a method of reconnaissance that minimizes detection risk?
Signup and view all the answers
Technical data obtained during reconnaissance includes information such as geographic locations of the organization.
Technical data obtained during reconnaissance includes information such as geographic locations of the organization.
Signup and view all the answers
What type of data includes items like internet-routable subnets and antivirus software used?
What type of data includes items like internet-routable subnets and antivirus software used?
Signup and view all the answers
The ___ phase is crucial in setting the stage for future attacks in any penetration attempt.
The ___ phase is crucial in setting the stage for future attacks in any penetration attempt.
Signup and view all the answers
Match the following types of data with their descriptions:
Match the following types of data with their descriptions:
Signup and view all the answers
Which of the following represents a source from which reconnaissance data can be obtained?
Which of the following represents a source from which reconnaissance data can be obtained?
Signup and view all the answers
Active reconnaissance is often undetectable by the target organization.
Active reconnaissance is often undetectable by the target organization.
Signup and view all the answers
Name one type of non-technical data that can be collected during reconnaissance.
Name one type of non-technical data that can be collected during reconnaissance.
Signup and view all the answers
Which of the following ports are commonly used to identify web services?
Which of the following ports are commonly used to identify web services?
Signup and view all the answers
Geolocation data can only be obtained from GPS systems.
Geolocation data can only be obtained from GPS systems.
Signup and view all the answers
What technology allows for the automated dialing of phone numbers?
What technology allows for the automated dialing of phone numbers?
Signup and view all the answers
The GPS system uses __________ to calculate the current location on Earth.
The GPS system uses __________ to calculate the current location on Earth.
Signup and view all the answers
Match the following systems with their uses:
Match the following systems with their uses:
Signup and view all the answers
What is a requirement for a DNS server to be vulnerable to cache snooping?
What is a requirement for a DNS server to be vulnerable to cache snooping?
Signup and view all the answers
An iterative DNS query returns results directly to the client without querying other DNS servers.
An iterative DNS query returns results directly to the client without querying other DNS servers.
Signup and view all the answers
What is the primary purpose of using the Border Gateway Protocol (BGP)?
What is the primary purpose of using the Border Gateway Protocol (BGP)?
Signup and view all the answers
Performing ______ sweeps is one basic approach to identifying systems exposed to the internet.
Performing ______ sweeps is one basic approach to identifying systems exposed to the internet.
Signup and view all the answers
Match the following query types with their characteristics:
Match the following query types with their characteristics:
Signup and view all the answers
What might be a consequence of having two firewalls with different configurations?
What might be a consequence of having two firewalls with different configurations?
Signup and view all the answers
DNS cache snooping can be used as a technique to identify the systems that users have accessed.
DNS cache snooping can be used as a technique to identify the systems that users have accessed.
Signup and view all the answers
List one basic technique for identifying services exposed to the internet.
List one basic technique for identifying services exposed to the internet.
Signup and view all the answers
Which scanning approach is recommended if you suspect the target organization has detection technologies?
Which scanning approach is recommended if you suspect the target organization has detection technologies?
Signup and view all the answers
Organizations typically provide remote access services using non-standard ports.
Organizations typically provide remote access services using non-standard ports.
Signup and view all the answers
What type of information can the results of port scanning inform the next phase of an attack?
What type of information can the results of port scanning inform the next phase of an attack?
Signup and view all the answers
Using a ______ box or proxy helps maintain anonymity during scans.
Using a ______ box or proxy helps maintain anonymity during scans.
Signup and view all the answers
Match the scanning approaches with their intended use:
Match the scanning approaches with their intended use:
Signup and view all the answers
What is a potential action if there are no remote services available during scanning?
What is a potential action if there are no remote services available during scanning?
Signup and view all the answers
Why is it important to perform multiple scans?
Why is it important to perform multiple scans?
Signup and view all the answers
It is assumed that most scanning activities will go unnoticed by organizations.
It is assumed that most scanning activities will go unnoticed by organizations.
Signup and view all the answers
Study Notes
Reconnaissance Steps
- Reconnaissance must be performed before any other step in an attack.
- Advanced attackers spend a lot of time on reconnaissance.
Data Categories
- Technical data includes information about an organization’s systems like subnets, antivirus software, and DNS records.
- Non-technical data includes information about an organization’s physical location, departments, and key personnel.
Data Sources
- Physical sources are any sources that are not obtained digitally, such as documents or videos.
- Digital sources are obtained automatically over the internet or from technology.
Data Methods
- Active reconnaissance is detectable by the target organization.
- Passive reconnaissance uses sources that the target organization does not own, making it harder to detect.
Target Data
- The target's IP address ranges, DNS records, and Autonomous System (AS) number allocations provide important information about their infrastructure.
DNS Techniques
- Domain harvesting allows attackers to identify many hosts by collecting DNS names from websites.
- DNS cache snooping can enumerate websites and systems that users or systems at the target organization have requested.
BGP Information
- Companies typically have multiple internet providers each with a firewall, which could have different security configurations.
- This information can be used to find an easier path for attack.
Port Scanning
- Port scanning helps identify systems and services exposed to the internet, which is crucial for planning future attack phases.
- To avoid detection, attackers use a “slow and low” approach for stealthy scans or a “hard and fast” approach for rapid information gathering.
Web Service Enumeration
- Identifying remote access services, such as VPNs or web portals, is crucial for understanding the target organization's security postures.
- Understanding the target organization's use of web-based services can be helpful for attack planning, especially if the target uses teleconferencing systems, server administration tools, or security camera systems.
Geolocation Information
- Metadata from digital photos, especially GPS coordinates and timestamps, can be used to gather geolocation data about target individuals or assets.
Phone System Information
- VoIP technology allows attackers to automatically dial phone numbers, gather voice traffic, and use automated dialers for reconnaissance.
Reconnaissance
- Reconnaissance is the first and most crucial step in an attack.
- It involves gathering information about the target organization to identify vulnerabilities.
- Advanced attackers spend significant time on reconnaissance to thoroughly understand the target.
- Reconnaissance data is categorized as technical or non-technical and obtained from physical or cyber sources.
- Two main methods for gathering data are active and passive reconnaissance.
Technical Data
- Examples of technical data: internet-routable subnets, antivirus software, DNS records.
- Key technical data to collect: user names and email formats, remote access systems.
- Registrant information: Whois and registrant information, IP address allocations, Autonomous System numbers, DNS reverse record delegation.
- Network allocation: IPV4 and IPV6 address space assigned to the organization.
- Autonomous Systems: AS number uniquely identifies an IP address range or subnet.
- DNS Information: DNS records provide technical and non-technical information about the organization.
Domain Harvesting
- Identify hosts by harvesting DNS names from websites using specialized tools.
- Organizations can have separate DNS zones for internal and external use.
- Third-party vendors might host domain names belonging to the target organization.
DNS Cache Snooping
- Enumerates websites and systems accessed by users or systems at the target organization.
- Requires DNS server configured for recursive queries, making it vulnerable.
- Iterative query: DNS server responds with a list of other DNS servers for the client to query.
- Recursive query: DNS server queries other servers and returns the result directly to the client.
Border Gateway Protocol (BGP)
- The primary routing protocol for the internet.
- Enables decentralized and dynamic exchange of routing information.
- BGP configuration can prioritize provider connections, leading to different firewall configurations.
- One firewall might be less restrictive than the other, providing potential exploit paths.
System and Service Identification
- Identify systems and services exposed to the internet through ping sweeps and port scans.
- Port scans are essential for identifying systems, services, and information for future attack phases.
- Consider using slow and low scans for organizations with security technologies.
- Harden fast scans can be used for organizations with fewer security measures.
- Use bounce boxes or proxies to mask scanning activities.
- Information obtained from port scanning is crucial for spear phishing attacks.
- Identifying remote access services like VPNs can help focus on obtaining valid credentials for remote access.
Web Service Enumeration
- Identify remote access services operating over web ports.
- Modern organizations prioritize user-friendly remote access methods like web VPNs, webmail, and portals.
- Identify other web services used by the organization, including teleconference systems, administration tools, security cameras, and phone management systems.
- Focus on common web ports like 80, 443, and 8080 using tools like nmap.
Web Service Exploration
- Identify the services offered by web systems identified through port scanning and DNS harvesting.
Geolocation Information
- Gather physical location data of assets owned by or related to the target organization.
- Location data often associated with specific employees or shared among employees.
- Metadata from digital photos can provide geolocation data, including GPS coordinates, time, and date.
Data from the Phone System
- Phone systems can be used for reconnaissance, ranging from manual to automated methods.
- VoIP enables automated dialing of phone numbers.
APT Approach to Reconnaissance
- Reconnaissance is the most important step for an APT attack and must always be performed first.
- APT attackers spend a significant amount of time on reconnaissance to explore vulnerabilities.
- There are two main categories of data: technical and non-technical.
- Technical data includes internet-routable subnets, antivirus software, and DNS records.
- Non-technical data includes geographic locations, major departments, and important personnel.
Data Categories
- Data can be obtained from Physical and Cyber sources.
- Active reconnaissance is any activity detectable by the target organization.
- Passive reconnaissance leverages sources not owned by the target, making detection harder.
Registrant Information
- Whois information provides valuable data such as registrant details, IP addresses, and autonomous system numbers.
Network Allocation
- IPV4 and IPV6 address allocations are listed under "Networks."
- Many organizations have large ranges of unused IP addresses.
Autonomous Systems
- Autonomous systems (AS) are uniquely identified by a 16-bit or 32-bit number.
- AS numbers are used in the Border Gateway Protocol (BGP), which is the "routing protocol of the internet."
Domain Harvesting
- Domain harvesting identifies hosts by collecting DNS names from websites.
- Various tools are available to assist with this process.
DNS Zones
- Organizations can have separate DNS zones for internal and external use.
- Internal systems might use distinct domain names.
- Third-party vendors might host domain names for the target organization.
DNS Cache Snooping
- DNS cache snooping allows enumeration of websites and systems requested by users or systems at the target organization.
- The DNS server must be configured to allow recursive queries for this to work.
Border Gateway Protocol (BGP)
- BGP is the primary routing protocol for the internet.
- It facilitates a decentralized and dynamic exchange of routing information.
- Different ISP providers can offer DNS subnets over their links.
- Firewall configurations on backup networks may be less restrictive, providing potential exploit paths.
System and Service Identification
- Port scans and ping sweeps are basic techniques for identifying exposed systems and services.
- Slow and low scans minimize detection risk, while hard and fast scans are used when detection is unlikely.
- Bounce boxes or proxies are used to conceal scanning activities.
- Information from port scans is crucial for future attack phases like spear phishing.
Web Service Enumeration
- Remote access services are prioritized targets for identification.
- Organizations often use standard web ports or helper services for remote access.
- SSL, web VPN systems, web email access, and portal systems are common remote access methods.
- Other web services, like teleconference, administration tools, security cameras, and phone management systems, can provide valuable information.
Web Service Exploration
- Nmap is used to identify hosts with common web services like ports 80, 443, and 8080.
- Tools like theharvester help identify web systems from port scans and DNS hostnames.
Geolocation Information
- Geolocation data refers to physical locations associated with the target organization.
- Metadata from digital photos, particularly GPS coordinates, is often used to gain geolocation data.
- Cameras and smartphones typically embed GPS coordinates, time, and date in their photos.
Data from Phone System
- Phone systems provide opportunities for reconnaissance.
- VoIP (Voice over Internet Protocol) enables automated dialing of phone numbers.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz delves into the vital reconnaissance steps in cybersecurity. It covers technical and non-technical data categories, data sources, and methods, including active and passive reconnaissance. Test your knowledge on how attackers use reconnaissance to gather critical information.