Untitled Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of these are types of information you are looking to collect about an organization during the information gathering phase? (Select all that apply)

  • Open ports on those target systems (correct)
  • Software used on the target systems (correct)
  • Public IP addresses used by the organization (correct)
  • Email addresses and phone numbers of employees (correct)
  • Target systems that are up and running (correct)
  • Whether software is running in the cloud (correct)

What is the term used for discovering information from public data sources available on the Internet?

  • Open Source Internet (OSI)
  • Open Source Network (OSN)
  • Open Source Information (OSI)
  • Open Source Intelligence (OSINT) (correct)

Which of these are techniques used for website reconnaissance? (Select all that apply)

  • Robots.txt (correct)
  • Scraping Websites (correct)
  • Manual Inspection of Web Links (correct)
  • Crawling Websites (correct)

What is the term used for an information gathering technique in which specific keywords are used to search Google or other search engines?

<p>Google hacking (D)</p> Signup and view all the answers

What is the name of a program in Kali Linux used to collect public information from resources such as Google, LinkedIn, Twitter and Bing?

<p>TheHarvester</p> Signup and view all the answers

What is the name of a widely used database search used to discover domain name information and IP address information about a company?

<p>Whois (B)</p> Signup and view all the answers

Which of these are common tools used for DNS profiling? (Select all that apply)

<p>dig (B), nslookup (C)</p> Signup and view all the answers

Which of these methods can modify the timing of a Nmap scan?

<p>-T4 (A), -T0 (B)</p> Signup and view all the answers

Which Nmap switch is used to perform a port scan and identify the version of the software running on each port?

<p>-sV (C)</p> Signup and view all the answers

Which of these tools are typically used to identify systems that are running on a network? (Select all that apply)

<p>netdiscover (C), nmap (D)</p> Signup and view all the answers

Which of these tools are often used to gather information for OSINT? (Select all that apply)

<p>Whois (A), theHarvester (B), Maltego (C), Shodan (D)</p> Signup and view all the answers

Vulnerability scanning is considered a passive assessment because you are not actively trying to exploit the system.

<p>True (A)</p> Signup and view all the answers

What is the term used to describe the process of connecting to and interrogating a network or system to retrieve information about that network or system?

<p>Enumeration (D)</p> Signup and view all the answers

Nmap can be used to identify hosts and services, along with identifying the operating system and the version of the software running on those systems?

<p>True (A)</p> Signup and view all the answers

Which Nmap switch is often used to perform a basic ping sweep across a network?

<p>-sP (A)</p> Signup and view all the answers

A TCP connect scan is considered more stealthy, compared to a SYN scan, as it does not perform a full handshake?

<p>False (B)</p> Signup and view all the answers

Which Nmap switch allows you to specify the ports to scan?

<p>-p (B)</p> Signup and view all the answers

Which Nmap switch is used to specify a file containing a list of targets to scan?

<p>-iL (C)</p> Signup and view all the answers

Which of these are common techniques used to detect and avoid security solutions like WAFs (web application firewalls) and intrusion detection systems?

<p>Packet crafting (A), Timing (D)</p> Signup and view all the answers

What is the purpose of a ping sweep within the context of active reconnaissance?

<p>To identify which systems on a network are actively responding (D)</p> Signup and view all the answers

What is the primary purpose of using the '-sT' flag within Nmap?

<p>To establish a full TCP connection to each target port (B)</p> Signup and view all the answers

Which of these are common steps involved in enumeration? (Select all that apply)

<p>Enumerating networks (A), Enumerating services (B), Enumerating domains (C), Enumerating hosts on the network (D), Enumerating users (E)</p> Signup and view all the answers

Which of these are common tools or techniques used to detect load balancers? (Select all that apply)

<p>Network topology analysis (B), IP address enumeration (C)</p> Signup and view all the answers

What is the purpose of using 'Recon-ng' in the context of OSINT gathering?

<p>To collect information about a company's network and systems, such as domain names, IP addresses, and email addresses (B)</p> Signup and view all the answers

What is the primary purpose of using security tokens within an application?

<p>To authorize users to perform specific actions within an application (C)</p> Signup and view all the answers

A common penetration testing technique is to fingerprint the target operating system as a first step in the vulnerability identification process.

<p>True (A)</p> Signup and view all the answers

What is a primary advantage of using the '-sV' flag with Nmap?

<p>Identifying known security vulnerabilities based on the identified software version (D)</p> Signup and view all the answers

Flashcards

Information Gathering

The process of collecting information about a target organization or company before a penetration test.

Passive Information Gathering

Collecting information from publicly available sources without interacting with the target systems.

Active Information Gathering

Collecting information by interacting with the target systems, potentially exposing them to risks.

OSINT (Open-Source Intelligence)

Gathering information from publicly available online sources.

Signup and view all the flashcards

DNS Profiling

Using DNS records to analyze system configurations and find publicly accessible services.

Signup and view all the flashcards

Nmap

A tool for active scanning and probing to discover open ports and running services on target systems.

Signup and view all the flashcards

Enumeration

The process of identifying all the accessible data of a target system.

Signup and view all the flashcards

Website Reconnaissance

Examining a target company's website to find useful information for penetration testing, such as software details or employee contact information.

Signup and view all the flashcards

Public IP Addresses

Internet addresses of servers or systems belonging to a target organization.

Signup and view all the flashcards

Target Systems

The systems or servers belonging to the target organization being assessed.

Signup and view all the flashcards

Open Ports

Communication channels (ports) on target systems that are accessible from the outside.

Signup and view all the flashcards

Software

The programs or applications running on the target systems.

Signup and view all the flashcards

Social Engineering

Manipulating people to gain access to sensitive information or systems.

Signup and view all the flashcards

Email addresses/phone numbers

Contact details of employees used for potential social engineering attacks.

Signup and view all the flashcards

Cloud-based systems

Servers, software, or data hosted and managed remotely by a third-party provider rather than locally on-site.

Signup and view all the flashcards

Self-hosted systems

Servers, software, or data run and managed by the target organization on their own servers or infrastructures.

Signup and view all the flashcards

Study Notes

Exam Objectives

  • Knowing the difference between passive and active information gathering
  • Understanding open-source intelligence (OSINT) gathering
  • Using DNS profiling
  • Using Nmap for active scanning
  • Being familiar with enumeration techniques
  • Understanding vulnerabilities in your targets
  • Performing vulnerability scans and analyzing results
  • Mapping vulnerabilities to exploits
  • Learning the types of weaknesses in specialized systems

Chapter 3: Information Gathering

  • After planning and scoping the penetration testing, the next phase is information gathering and vulnerability identification.
  • Tools are used to discover information about an organization or company before penetration testing begins.
  • Examples of information gathered during this phase:
    • Email addresses and phone numbers of employees (for social engineering)
    • Public IP addresses used by the organization
    • Target systems that are running
    • Open ports on target systems
    • Software used on target systems
    • Whether the software is running in the cloud or is self-hosted

Chapter 4: Vulnerability Identification

  • After reconnaissance, the next phase is vulnerability identification.
  • Vulnerability scanning is a passive assessment, not an attempt to exploit the system.
  • A vulnerability is a weakness in a system that can be exploited to compromise security.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
55 questions

Untitled Quiz

StatuesquePrimrose avatar
StatuesquePrimrose
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Untitled Quiz
48 questions

Untitled Quiz

StraightforwardStatueOfLiberty avatar
StraightforwardStatueOfLiberty
Use Quizgecko on...
Browser
Browser