4_1_2 Section 4 – Operations and Incident Response - 4.1 – Security Tools - Reconnaissance Tools – Part 2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of the curl tool?

  • To perform FTP functions only
  • To retrieve emails from a website
  • To display graphical views of web pages
  • To grab raw data from websites and display it in a terminal screen (correct)

What is the meaning of the 'curl' acronym?

  • Cross-platform URL Reader
  • Common Utility for Resource Linking
  • Command URL Locator
  • Client URL or Uniform Resource Locator (correct)

What is the advantage of using curl to view a website?

  • It allows users to search through the website's source code (correct)
  • It is only available on Linux or Mac OS systems
  • It only works with secure websites using HTTPS
  • It provides a more graphical view of the website

What is the result of running the curl command on www.professormesser.com?

<p>It shows a 301 moved permanently message and redirects to a secure website (B)</p> Signup and view all the answers

What is an advantage of using a pre-configured Linux version like callie?

<p>It has a number of pre-configured reconnaissance tools ready to run (B)</p> Signup and view all the answers

What is the primary difference between viewing a website in a browser and using curl?

<p>The graphical view versus raw HTML data (B)</p> Signup and view all the answers

What is the primary function of the Nmap scripting engine?

<p>To run vulnerability scans and other tests on a device (A)</p> Signup and view all the answers

What is the term used to describe the information gathered from public websites?

<p>OSINT (Open Source Intelligence) (B)</p> Signup and view all the answers

What is the primary function of the Harvester tool?

<p>To gather open source intelligence from public websites (B)</p> Signup and view all the answers

What is the purpose of running a Nmap scan with the verbose option?

<p>To gather more information about the scan process (D)</p> Signup and view all the answers

What is the role of the Sniper tool in reconnaissance?

<p>To combine the results of multiple reconnaissance tools (A)</p> Signup and view all the answers

What type of scans can be run using the Nmap tool?

<p>Vulnerability scans and service scans (D)</p> Signup and view all the answers

What is the benefit of using the Harvester tool?

<p>It reduces the time and effort required to gather information (C)</p> Signup and view all the answers

What is the purpose of the Sniper tool's stealth mode?

<p>To avoid detection by the target device (A)</p> Signup and view all the answers

What type of information can be gathered using the Harvester tool?

<p>A variety of information from public websites and sources (D)</p> Signup and view all the answers

What is the risk of using reconnaissance tools like Sniper?

<p>They may cause denial of service situations (B)</p> Signup and view all the answers

What is the purpose of the curl command?

<p>To view the source code of a website as HTML (C)</p> Signup and view all the answers

What is the primary difference between the ping command and the hping command?

<p>The hping command can modify almost everything about the packet (A)</p> Signup and view all the answers

What is the potential risk of using IP scanning tools?

<p>Denial of service to other devices on the network (B)</p> Signup and view all the answers

What is the purpose of the sudo command in the hping command?

<p>To run the command with elevated rights and permissions (B)</p> Signup and view all the answers

What is the function of the Nmap tool?

<p>To identify open ports on a device and the operating system (B)</p> Signup and view all the answers

What is the result of running the hping command with the scan option and specifying ports 80 through 443?

<p>Ports 80 and 443 are open on the device (B)</p> Signup and view all the answers

What is the advantage of using hping over the ping command?

<p>Hping can modify almost everything about the packet (A)</p> Signup and view all the answers

What is the purpose of the ARP technique in IP scanning?

<p>To find devices on a local subnet (A)</p> Signup and view all the answers

What is the difference between hping and Nmap?

<p>Hping is used for port scanning, while Nmap is used for identifying open ports and operating systems (A)</p> Signup and view all the answers

What is the purpose of the ICMP timestamp request technique in IP scanning?

<p>To identify devices on a network (B)</p> Signup and view all the answers

What is a potential issue when performing a port scan?

<p>The device performing the scan may be easily identified as the source. (D)</p> Signup and view all the answers

What is the purpose of the scanless utility?

<p>To perform a port scan through a proxy. (B)</p> Signup and view all the answers

What is the dnsenum command used for?

<p>To enumerate DNS information from a DNS server. (B)</p> Signup and view all the answers

What is the purpose of the sniper query?

<p>To gather information about a target domain using multiple tools. (A)</p> Signup and view all the answers

What is the spider IP service used for?

<p>To provide a proxy for port scanning. (C)</p> Signup and view all the answers

What is the result of running a sniper query on example.com?

<p>A set of information gathered from multiple tools and sources. (B)</p> Signup and view all the answers

What is the purpose of the Nmap tool?

<p>To perform a port scan on a target host. (B)</p> Signup and view all the answers

What is the advantage of using a proxy service like scanless?

<p>It hides the source of the scan. (A)</p> Signup and view all the answers

What is the result of running a dnsenum query on example.com?

<p>A set of DNS information gathered from the DNS server and other sources. (A)</p> Signup and view all the answers

What is the purpose of the brute force feature in dnsenum?

<p>To identify subdomains and hosts on a target domain. (C)</p> Signup and view all the answers

What is the purpose of the Nessus scanner?

<p>To scan a remote IP address for vulnerabilities (B)</p> Signup and view all the answers

What was the result of running the Nessus scanner against a single IP address?

<p>It found 71 informational vulnerabilities and some high and critical vulnerabilities (A)</p> Signup and view all the answers

What is the purpose of the Cuckoo sandbox?

<p>To run programs in a virtualized environment to identify malware (D)</p> Signup and view all the answers

Why is it not recommended to run an executable on a production machine to test it?

<p>It may contain malware or be malicious (D)</p> Signup and view all the answers

What is the benefit of using Nessus to scan many different IP addresses or ranges of IP addresses?

<p>It can create a database of vulnerabilities to identify safer systems (A)</p> Signup and view all the answers

What was the critical vulnerability identified by Nessus regarding the Unix operating system?

<p>Unsupported version detection (D)</p> Signup and view all the answers

What type of analysis can Cuckoo perform on an executable?

<p>API calls and memory analysis (C)</p> Signup and view all the answers

What is the advantage of using Cuckoo to evaluate executables?

<p>It can run executables safely without risking the production environment (C)</p> Signup and view all the answers

What is the benefit of Nessus's extensive reporting and information?

<p>It helps identify vulnerabilities and provides solutions to resolve them (B)</p> Signup and view all the answers

What is the limitation of the Unix operating system vulnerability identified by Nessus?

<p>It is no longer supported by the vendor (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Soft Curl Perm Flashcards
32 questions
Soft Curl Permanent Wave Flashcards
7 questions
Hair Styling: Pin Curl Techniques
8 questions

Hair Styling: Pin Curl Techniques

CostEffectiveGeometry7047 avatar
CostEffectiveGeometry7047
Use Quizgecko on...
Browser
Browser