4_1_2 Section 4 – Operations and Incident Response - 4.1 – Security Tools - Reconnaissance Tools – Part 2
46 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the curl tool?

  • To perform FTP functions only
  • To retrieve emails from a website
  • To display graphical views of web pages
  • To grab raw data from websites and display it in a terminal screen (correct)
  • What is the meaning of the 'curl' acronym?

  • Cross-platform URL Reader
  • Common Utility for Resource Linking
  • Command URL Locator
  • Client URL or Uniform Resource Locator (correct)
  • What is the advantage of using curl to view a website?

  • It allows users to search through the website's source code (correct)
  • It is only available on Linux or Mac OS systems
  • It only works with secure websites using HTTPS
  • It provides a more graphical view of the website
  • What is the result of running the curl command on www.professormesser.com?

    <p>It shows a 301 moved permanently message and redirects to a secure website</p> Signup and view all the answers

    What is an advantage of using a pre-configured Linux version like callie?

    <p>It has a number of pre-configured reconnaissance tools ready to run</p> Signup and view all the answers

    What is the primary difference between viewing a website in a browser and using curl?

    <p>The graphical view versus raw HTML data</p> Signup and view all the answers

    What is the primary function of the Nmap scripting engine?

    <p>To run vulnerability scans and other tests on a device</p> Signup and view all the answers

    What is the term used to describe the information gathered from public websites?

    <p>OSINT (Open Source Intelligence)</p> Signup and view all the answers

    What is the primary function of the Harvester tool?

    <p>To gather open source intelligence from public websites</p> Signup and view all the answers

    What is the purpose of running a Nmap scan with the verbose option?

    <p>To gather more information about the scan process</p> Signup and view all the answers

    What is the role of the Sniper tool in reconnaissance?

    <p>To combine the results of multiple reconnaissance tools</p> Signup and view all the answers

    What type of scans can be run using the Nmap tool?

    <p>Vulnerability scans and service scans</p> Signup and view all the answers

    What is the benefit of using the Harvester tool?

    <p>It reduces the time and effort required to gather information</p> Signup and view all the answers

    What is the purpose of the Sniper tool's stealth mode?

    <p>To avoid detection by the target device</p> Signup and view all the answers

    What type of information can be gathered using the Harvester tool?

    <p>A variety of information from public websites and sources</p> Signup and view all the answers

    What is the risk of using reconnaissance tools like Sniper?

    <p>They may cause denial of service situations</p> Signup and view all the answers

    What is the purpose of the curl command?

    <p>To view the source code of a website as HTML</p> Signup and view all the answers

    What is the primary difference between the ping command and the hping command?

    <p>The hping command can modify almost everything about the packet</p> Signup and view all the answers

    What is the potential risk of using IP scanning tools?

    <p>Denial of service to other devices on the network</p> Signup and view all the answers

    What is the purpose of the sudo command in the hping command?

    <p>To run the command with elevated rights and permissions</p> Signup and view all the answers

    What is the function of the Nmap tool?

    <p>To identify open ports on a device and the operating system</p> Signup and view all the answers

    What is the result of running the hping command with the scan option and specifying ports 80 through 443?

    <p>Ports 80 and 443 are open on the device</p> Signup and view all the answers

    What is the advantage of using hping over the ping command?

    <p>Hping can modify almost everything about the packet</p> Signup and view all the answers

    What is the purpose of the ARP technique in IP scanning?

    <p>To find devices on a local subnet</p> Signup and view all the answers

    What is the difference between hping and Nmap?

    <p>Hping is used for port scanning, while Nmap is used for identifying open ports and operating systems</p> Signup and view all the answers

    What is the purpose of the ICMP timestamp request technique in IP scanning?

    <p>To identify devices on a network</p> Signup and view all the answers

    What is a potential issue when performing a port scan?

    <p>The device performing the scan may be easily identified as the source.</p> Signup and view all the answers

    What is the purpose of the scanless utility?

    <p>To perform a port scan through a proxy.</p> Signup and view all the answers

    What is the dnsenum command used for?

    <p>To enumerate DNS information from a DNS server.</p> Signup and view all the answers

    What is the purpose of the sniper query?

    <p>To gather information about a target domain using multiple tools.</p> Signup and view all the answers

    What is the spider IP service used for?

    <p>To provide a proxy for port scanning.</p> Signup and view all the answers

    What is the result of running a sniper query on example.com?

    <p>A set of information gathered from multiple tools and sources.</p> Signup and view all the answers

    What is the purpose of the Nmap tool?

    <p>To perform a port scan on a target host.</p> Signup and view all the answers

    What is the advantage of using a proxy service like scanless?

    <p>It hides the source of the scan.</p> Signup and view all the answers

    What is the result of running a dnsenum query on example.com?

    <p>A set of DNS information gathered from the DNS server and other sources.</p> Signup and view all the answers

    What is the purpose of the brute force feature in dnsenum?

    <p>To identify subdomains and hosts on a target domain.</p> Signup and view all the answers

    What is the purpose of the Nessus scanner?

    <p>To scan a remote IP address for vulnerabilities</p> Signup and view all the answers

    What was the result of running the Nessus scanner against a single IP address?

    <p>It found 71 informational vulnerabilities and some high and critical vulnerabilities</p> Signup and view all the answers

    What is the purpose of the Cuckoo sandbox?

    <p>To run programs in a virtualized environment to identify malware</p> Signup and view all the answers

    Why is it not recommended to run an executable on a production machine to test it?

    <p>It may contain malware or be malicious</p> Signup and view all the answers

    What is the benefit of using Nessus to scan many different IP addresses or ranges of IP addresses?

    <p>It can create a database of vulnerabilities to identify safer systems</p> Signup and view all the answers

    What was the critical vulnerability identified by Nessus regarding the Unix operating system?

    <p>Unsupported version detection</p> Signup and view all the answers

    What type of analysis can Cuckoo perform on an executable?

    <p>API calls and memory analysis</p> Signup and view all the answers

    What is the advantage of using Cuckoo to evaluate executables?

    <p>It can run executables safely without risking the production environment</p> Signup and view all the answers

    What is the benefit of Nessus's extensive reporting and information?

    <p>It helps identify vulnerabilities and provides solutions to resolve them</p> Signup and view all the answers

    What is the limitation of the Unix operating system vulnerability identified by Nessus?

    <p>It is no longer supported by the vendor</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser