Chapter 3: Information Gathering

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Open Source Intelligence

OSINT

2
New cards

Common Vulnerabilities and Exposures (CVE)

list that identifies vulnerabilities by name, number, and descriptions

3
New cards

CVE-[YEAR]-[NUMBER]

CVE listing format

4
New cards

Common Weakness Enumeration

community developed list of vulnerabilities, similar to CVE

5
New cards

Fingerprinting Organizations and Collected Archives

FOCA

6
New cards

generic top level domain

gTLD

7
New cards

country code top level domain

ccTLD

8
New cards

DNS zone transfer (AXFR)

transaction that is intended to be used to replicate DNS databases between DNS servers.

9
New cards

Wardriving

process of scanning for wireless networks while mobile (usually in a car), but can also be done by walking though public areas

10
New cards

Google Hacking Database

GHDB

11
New cards

Range of Well-Known/System ports

0-1023

12
New cards

Registered Ports range

1024-49151

13
New cards

Operating system fingerprinting

ability to identify an operating system based on the network traffic that is being sent

14
New cards

Nmap -sS

Nmap TCP SYN scan

15
New cards

Nmap -sT

Nmap TCP Connect

16
New cards

Nmap -sU

UDP only scan

17
New cards

-p

command line option for Nmap that lets you choose the port range or port name
Ex. - _ http

18
New cards

Nmap -sA

Nmap TCP ACK

19
New cards

Nmap -T0 to -T5

Increases the speed of an nmap scan

20
New cards

Nmap -O

OS detection flag for nmap

21
New cards

Nmap -Pn

disable the ping for nmap scan

22
New cards

Nmap -T

control the aggressiveness of the timing, nmap scan

23
New cards

Nmap -IL

input from a target, nmap

24
New cards

Nmap -oX

XML format output for nmap

25
New cards

Nmap -oN

Normal output for nmap

26
New cards

Nmap -oG

Greppable format nmap

27
New cards

Nmap -oA

all output mode nmap

28
New cards

vulnerability management life cycle

VMLC

29
New cards

VMLC phases

1) Detection

2) Remediation

3) Testing