Network Security Scanning
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of Network Tools Pro?

  • Conducting penetration testing
  • Scanning for open ports
  • Troubleshooting and diagnosing network issues (correct)
  • Drawing network diagrams
  • What type of information does Network Tools Pro list automatically?

  • Only URLs and domain names
  • Only IP addresses
  • IP addresses, hostnames, domain names, email addresses, and URLs (correct)
  • Only IP addresses and hostnames
  • What is the purpose of scanning beyond IDS?

  • To detect vulnerability in the system
  • To bypass security measures (correct)
  • To identify open ports
  • To prepare proxies
  • What is banner grabbing?

    <p>A technique used to gather information about a system</p> Signup and view all the answers

    What is the purpose of preparing proxies?

    <p>To mask IP addresses</p> Signup and view all the answers

    What is the purpose of scanning for vulnerabilities?

    <p>To detect weaknesses in the system</p> Signup and view all the answers

    What is the purpose of drawing network diagrams?

    <p>To visualize network architecture</p> Signup and view all the answers

    What is the purpose of checking for live systems?

    <p>To identify hosts that are active on the network</p> Signup and view all the answers

    What is the purpose of checking for open ports?

    <p>To identify open communication channels</p> Signup and view all the answers

    What is penetration testing?

    <p>A simulated cyber attack to test defenses</p> Signup and view all the answers

    What is the primary purpose of network scanning?

    <p>To identify hosts, ports, and services in a network</p> Signup and view all the answers

    What technique is used to remain anonymous while scanning a network?

    <p>Using proxies and anonymizers</p> Signup and view all the answers

    What is the goal of banner grabbing?

    <p>To gather information about a service or system</p> Signup and view all the answers

    What is IP spoofing used for in network scanning?

    <p>To evade IDS</p> Signup and view all the answers

    What is the purpose of drawing network diagrams?

    <p>To create a network map</p> Signup and view all the answers

    What is the term for testing a network's defenses?

    <p>Penetration testing</p> Signup and view all the answers

    What is the source IP address of the ICMP Echo Reply?

    <p>192.168.168.3</p> Signup and view all the answers

    What command is used to perform the ping scan using Nmap?

    <p>nmap sn 192.168.168.5</p> Signup and view all the answers

    What is the destination IP address of the ICMP Echo Reply?

    <p>192.168.168.5</p> Signup and view all the answers

    Which of the following is NOT a valid IP address in the output?

    <p>192.168.16.5</p> Signup and view all the answers

    What is the purpose of the nmap command?

    <p>To scan for open ports</p> Signup and view all the answers

    What protocol is used for the ping scan?

    <p>ICMP</p> Signup and view all the answers

    What is the IP address of the host that is being scanned?

    <p>192.168.168.5</p> Signup and view all the answers

    What is the purpose of the ICMP Echo Reply?

    <p>To respond to a ping request</p> Signup and view all the answers

    What is the primary purpose of network scanning in the context of intelligence gathering?

    <p>To create a comprehensive profile of the target organization</p> Signup and view all the answers

    What does a ping scan involve?

    <p>Sending ICMP ECHO requests to a host</p> Signup and view all the answers

    What is one of the objectives of network scanning?

    <p>To discover services running on hosts</p> Signup and view all the answers

    What is the outcome if a host is live when sent an ICMP ECHO request?

    <p>The host will return an ICMP ECHO reply</p> Signup and view all the answers

    What is the primary goal of scanning beyond IDS?

    <p>To evade detection by the IDS</p> Signup and view all the answers

    What is one of the uses of a ping scan?

    <p>To determine if a host is live</p> Signup and view all the answers

    What is the purpose of banner grabbing?

    <p>To identify the services running on a host</p> Signup and view all the answers

    What is one of the objectives of network scanning in the context of penetration testing?

    <p>To scan for vulnerabilities in live hosts</p> Signup and view all the answers

    Which tool is available at http://www.colasoft.com?

    <p>Colasoft Ping Tool</p> Signup and view all the answers

    What is the name of the tool available at http://www.pingtester.net?

    <p>Visual Ping Tester - Standard</p> Signup and view all the answers

    Which tool is available at http://www.nirsoft.net?

    <p>Ping Info View</p> Signup and view all the answers

    What is the name of the tool available at http://www.greenline-soft.com?

    <p>Network Ping</p> Signup and view all the answers

    Which tool is available at http://w1v111.digilextechnologies.com?

    <p>Ping Scanner Pro</p> Signup and view all the answers

    What is the name of the tool available at http://www.ipuptime.net?

    <p>Pinkie</p> Signup and view all the answers

    Which tool is available at http://www.niliand.com?

    <p>OpUtils</p> Signup and view all the answers

    Study Notes

    Network Scanning

    • Network scanning involves identifying hosts, ports, and services in a network to gather information about the target organization.
    • Objectives of network scanning include:
      • Identifying live hosts, IP addresses, and open ports of live hosts.
      • Discovering services running on hosts.
      • Discovering vulnerabilities in live hosts.

    Scanning Techniques

    • Ping scan: involves sending ICMP ECHO requests to a host to determine if it is live and if ICMP is passing through a firewall.
    • Ping scan output can be obtained using tools like Nmap.

    Tools for Ping Scanning

    • Colasoft Ping Tool: a network scanning tool for Windows.
    • Advanced IP Scanner: a free tool for scanning IP addresses and ports.
    • Visual Ping Tester - Standard: a tool for testing ping responses.
    • Ping Sweep: a tool for pinging a range of IP addresses.
    • Ping Scanner Pro: a tool for scanning IP addresses and ports.
    • OpUtils: a network management tool with ping scanning capabilities.
    • Ping Monitor: a tool for monitoring ping responses.
    • Ping Info View: a tool for viewing ping responses.
    • Pinkie: a tool for pinging IP addresses.

    Overview of Network Scanning Process

    • Sends packets to the network to gather information.
    • Gets network information about hosts, ports, and services.

    Check for Live Systems and Open Ports

    • Checking for live systems involves scanning for hosts that respond to ICMP ECHO requests.
    • Checking for open ports involves scanning for ports that respond to connection attempts.

    Scanning Beyond IDS and Banner Grabbing

    • Scanning beyond IDS (Intrusion Detection Systems) involves evading detection by IDS.
    • Banner grabbing involves collecting information about services running on hosts.

    Scan for Vulnerability and Draw Network Diagrams

    • Scanning for vulnerabilities involves identifying weaknesses in hosts and services.
    • Drawing network diagrams involves creating visual representations of the network infrastructure.

    Prepare Proxies and Scanning Pen Testing

    • Preparing proxies involves setting up anonymizers for attack.
    • Scanning pen testing involves simulating attacks on the network to test defenses.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers network security scanning techniques, including scanning for open ports, vulnerability scanning, and network diagramming. It also touches on the use of proxies and network troubleshooting tools.

    More Like This

    Use Quizgecko on...
    Browser
    Browser