Week 4-6 [Module 2]: Casing the Environment (Footprinting, and Scanning)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

36 Terms

1
New cards

Ethical Hackers

They are tasked with the knowledge skills and experience to perform risk assessments and test systems for security related issues.

2
New cards

Unauthorized Hackers (Black-hat)

Malicious types of hackers who often use their technical skills and knowledge to seize control of computers and operating systems with the intent of stealing valuable data.

3
New cards

Authorized Hackers (White-hat)

They are expected to follow a code of ethics while also following established laws and access permissions when conducting their activities.

4
New cards

Grey-Hat Hackers

Individuals who exploit security vulnerabilities to spread public awareness that the vulnerability exists. They do not share the malicious intent commonly attributed to unauthorized hackers but they also don’t necessarily adhere to a code of ethics.

5
New cards

Roles of an Ethical Hacker

  1. Obtain approval from the system owner before executing the security review. 2. Report any security breaches and vulnerabilities discovered within the system. 3. Wipe traces of the hack to ensure that malicious hackers cannot enter the system through identified loopholes.

6
New cards

Footprinting

The process of gathering information about a target system that can be used to execute a successful cyber attack.

7
New cards

Reconnaissance

The information-gathering stage of ethical hacking where you collect data about the target system. The goal is to identify as many potential attack vectors as possible.

8
New cards

Active Footprinting

Performing footprinting by getting in direct touch with the target machine.

9
New cards

Passive Footprinting

Collecting information about a system located at a remote distance from the attacker.

10
New cards

Organization’s Website

It’s the best place to begin for an attacker to look for open-source information which is information freely provided to clients customers or the general public.

11
New cards

Job Websites

Organizations share some confidential data on many JOB websites. For example a posting for "Lighttpd 2.0 Server Administrator" reveals that an organization uses the Lighttpd web server of version 2.0.

12
New cards

Social Media

Most people have the tendency to release most of their information online allowing hackers to create fake accounts to grab information.

13
New cards

Google Hacking

Using basic search techniques combined with advanced operators to do great damage.

14
New cards

Archive.org

A website that collects snapshots of all the websites at a regular interval of time allowing access to older versions of a website.

15
New cards

Wiretap

The attacker tries to record the personal conversation of the target victim with someone that’s being held over communication mediums like the Telephone.

16
New cards

Shoulder Surfing

Attacker tries to catch personal information like email id or password by looking over the victim’s shoulder while they are entering their details.

17
New cards

Sam Spade

A general-purpose Internet utility package with extra features to help in tracing the source of spam and other forms of Internet harassment.

18
New cards

NeoTrace

A well-known GUI route tracer program that graphically displays the route between you and the remote site including all intermediate nodes.

19
New cards

SpiderFoot

A free open-source tool available on Github written in Python that scrapes websites as well as Google Netcraft Whois and DNS.

20
New cards

DNS Enumerator

An automated sub-domain retrieval tool that scans Google to extract the results.

21
New cards

Web Data Extractor

Used to extract targeted company’s contact data (email phone fax) and extract url meta tag (title desc keyword).

22
New cards

Whois

A website that serves a good purpose for Hackers. Through this website information about the domain name email-id and domain owner can be traced.

23
New cards

SmartWhois

A tool that connects to an available database to provide information regarding a domain or host.

24
New cards

People Search (Intelius/Yahoo)

Used to find personal information like residential address contact numbers and satellite pictures of private residences.

25
New cards

Scanning

A network exploration technique used to identify the systems connected to an organization’s network.

26
New cards

Purpose of Scanning

To determine the perimeter of the target network; To provide a map of the network; To create a list of accessible computers; To know the possible applications and vulnerabilities; To know the operating system.

27
New cards

Pinger

A tool that sends an ICMP echo request to a range of IP addresses and lists all hosts that reply (e.g. NetScan Tools Hping).

28
New cards

Port Scanner

A tool that is used to detect services running in a computer and identify open ports (e.g. Netscan SuperScan NMAP).

29
New cards

War Dialers

Tools that are used to scan a range of phone numbers for vulnerable modems (e.g. THC-Scan ToneLoc).

30
New cards

TCP Connect Scan

A widely-used scanning technique in network security that helps identify the status of ports on a target system by establishing a full connection.

31
New cards

TCP SYN (Half-Open) Scan

A tactic used to determine the state of a communications port without establishing a full connection. Sometimes used to perform a DoS attack.

32
New cards

UDP Scan

On the Internet: Used to ID servers for DrDoS attacks. Internally: Used to ID open ports on machines.

33
New cards

Fingerprinting

Used to determine the operating system running in a computer.

34
New cards

Active Fingerprinting

Sends a packet to target computer and based on the response it guesses the OS running in the computer.

35
New cards

Passive Fingerprinting

Examines the packets for differences that can provide clues regarding the type of OS running.

36
New cards

Actionable Defenses

Avoid posting confidential data on social media; Avoid accepting unwanted friend requests; Proper configuration of web servers; Usage of footprinting techniques for identifying and removing sensitive information.