Network Security Scanning

FresherGyrolite5304 avatar
FresherGyrolite5304
·
·
Download

Start Quiz

Study Flashcards

39 Questions

What is the primary function of Network Tools Pro?

Troubleshooting and diagnosing network issues

What type of information does Network Tools Pro list automatically?

IP addresses, hostnames, domain names, email addresses, and URLs

What is the purpose of scanning beyond IDS?

To bypass security measures

What is banner grabbing?

A technique used to gather information about a system

What is the purpose of preparing proxies?

To mask IP addresses

What is the purpose of scanning for vulnerabilities?

To detect weaknesses in the system

What is the purpose of drawing network diagrams?

To visualize network architecture

What is the purpose of checking for live systems?

To identify hosts that are active on the network

What is the purpose of checking for open ports?

To identify open communication channels

What is penetration testing?

A simulated cyber attack to test defenses

What is the primary purpose of network scanning?

To identify hosts, ports, and services in a network

What technique is used to remain anonymous while scanning a network?

Using proxies and anonymizers

What is the goal of banner grabbing?

To gather information about a service or system

What is IP spoofing used for in network scanning?

To evade IDS

What is the purpose of drawing network diagrams?

To create a network map

What is the term for testing a network's defenses?

Penetration testing

What is the source IP address of the ICMP Echo Reply?

192.168.168.3

What command is used to perform the ping scan using Nmap?

nmap sn 192.168.168.5

What is the destination IP address of the ICMP Echo Reply?

192.168.168.5

Which of the following is NOT a valid IP address in the output?

192.168.16.5

What is the purpose of the nmap command?

To scan for open ports

What protocol is used for the ping scan?

ICMP

What is the IP address of the host that is being scanned?

192.168.168.5

What is the purpose of the ICMP Echo Reply?

To respond to a ping request

What is the primary purpose of network scanning in the context of intelligence gathering?

To create a comprehensive profile of the target organization

What does a ping scan involve?

Sending ICMP ECHO requests to a host

What is one of the objectives of network scanning?

To discover services running on hosts

What is the outcome if a host is live when sent an ICMP ECHO request?

The host will return an ICMP ECHO reply

What is the primary goal of scanning beyond IDS?

To evade detection by the IDS

What is one of the uses of a ping scan?

To determine if a host is live

What is the purpose of banner grabbing?

To identify the services running on a host

What is one of the objectives of network scanning in the context of penetration testing?

To scan for vulnerabilities in live hosts

Which tool is available at http://www.colasoft.com?

Colasoft Ping Tool

What is the name of the tool available at http://www.pingtester.net?

Visual Ping Tester - Standard

Which tool is available at http://www.nirsoft.net?

Ping Info View

What is the name of the tool available at http://www.greenline-soft.com?

Network Ping

Which tool is available at http://w1v111.digilextechnologies.com?

Ping Scanner Pro

What is the name of the tool available at http://www.ipuptime.net?

Pinkie

Which tool is available at http://www.niliand.com?

OpUtils

Study Notes

Network Scanning

  • Network scanning involves identifying hosts, ports, and services in a network to gather information about the target organization.
  • Objectives of network scanning include:
    • Identifying live hosts, IP addresses, and open ports of live hosts.
    • Discovering services running on hosts.
    • Discovering vulnerabilities in live hosts.

Scanning Techniques

  • Ping scan: involves sending ICMP ECHO requests to a host to determine if it is live and if ICMP is passing through a firewall.
  • Ping scan output can be obtained using tools like Nmap.

Tools for Ping Scanning

  • Colasoft Ping Tool: a network scanning tool for Windows.
  • Advanced IP Scanner: a free tool for scanning IP addresses and ports.
  • Visual Ping Tester - Standard: a tool for testing ping responses.
  • Ping Sweep: a tool for pinging a range of IP addresses.
  • Ping Scanner Pro: a tool for scanning IP addresses and ports.
  • OpUtils: a network management tool with ping scanning capabilities.
  • Ping Monitor: a tool for monitoring ping responses.
  • Ping Info View: a tool for viewing ping responses.
  • Pinkie: a tool for pinging IP addresses.

Overview of Network Scanning Process

  • Sends packets to the network to gather information.
  • Gets network information about hosts, ports, and services.

Check for Live Systems and Open Ports

  • Checking for live systems involves scanning for hosts that respond to ICMP ECHO requests.
  • Checking for open ports involves scanning for ports that respond to connection attempts.

Scanning Beyond IDS and Banner Grabbing

  • Scanning beyond IDS (Intrusion Detection Systems) involves evading detection by IDS.
  • Banner grabbing involves collecting information about services running on hosts.

Scan for Vulnerability and Draw Network Diagrams

  • Scanning for vulnerabilities involves identifying weaknesses in hosts and services.
  • Drawing network diagrams involves creating visual representations of the network infrastructure.

Prepare Proxies and Scanning Pen Testing

  • Preparing proxies involves setting up anonymizers for attack.
  • Scanning pen testing involves simulating attacks on the network to test defenses.

This quiz covers network security scanning techniques, including scanning for open ports, vulnerability scanning, and network diagramming. It also touches on the use of proxies and network troubleshooting tools.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser