Vulnerability Assessment: Information Gathering
6 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is information gathering?

Information gathering is the first step toward the actual assessment, where details about the assets in the scope of testing are collected.

Which types of information gathering are mentioned?

  • Indirect information gathering
  • Passive information gathering (correct)
  • Active information gathering (correct)
  • Direct information gathering
  • Passive information gathering involves direct contact with the target.

    False

    What does a reverse IP lookup do?

    <p>A reverse IP lookup probes an IP address for all the domains it hosts.</p> Signup and view all the answers

    What is the purpose of a site report?

    <p>A site report provides useful information about a domain, such as registrar, name-server, and technology used.</p> Signup and view all the answers

    What website allows you to view previous versions of websites?

    <p>archive.org</p> Signup and view all the answers

    Study Notes

    Information Gathering in Vulnerability Assessment

    • Information gathering is the crucial first step in vulnerability assessment. It allows for prioritization of assets before scanning.

    • The analogy of Abraham Lincoln sharpening his axe before chopping down a tree highlights the importance of thorough information gathering before assessment. A 360-degree view of the target is essential for effective assessment planning.

    Passive Information Gathering

    • Passive information gathering involves obtaining information without direct contact with the target system. Information is gathered through intermediary sources, often publicly available resources.

    • A passive information gathering process involves: a client system requesting information from an intermediary system, which then probes the target system. The target's response is relayed back through the intermediary to the client. This maintains partial anonymity for the client.

    Tools and Techniques for Passive Information Gathering

    • Reverse IP Lookup: This technique identifies all domains hosted on a given IP address. A tool for this is available at http://www.yougetsignal.com/tools/web-sites-on-web-server/ (Note: This link may be outdated). It only works for internet-facing websites.

    • Site Report: Tools like Netcraft (http://toolbar.netcraft.com/site_report) (Note: This link may be outdated) provide domain information including registrar, nameserver, DNS admin, and technology used.

    • Site Archive and Wayback Machine: The Wayback Machine (https://archive.org/) allows access to past versions of websites, potentially revealing information not present in the current version.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz explores the critical phase of information gathering in vulnerability assessment, underscoring its importance in planning effective assessments. It discusses techniques for passive information gathering and the use of intermediaries to gather data. Engage with the concepts that form the foundation of a successful vulnerability assessment.

    More Like This

    Use Quizgecko on...
    Browser
    Browser