Information Gathering

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

nslookup

a command that queries the Domain Name System servers for resource records

2
New cards

2 modes of nslookup

interactive or non-interactive

3
New cards

interactive mode

allows a user to execute queries back-to-back without typing the entire command for each query

4
New cards

non interactive

nvolves typing the entire command for each query. With a known domain name, nslookup will enumerate all IP’s correlated to that IP, aka DNS query.

5
New cards

reverse nslookup

translates an ip address into DNS

6
New cards

4 nslookup options

MX, NS, SOA, any

7
New cards

Dig

a command that queries the Domain Name System servers for records relating to IP addresses, mail exchanges, and name servers.

provides user with more options and more verbose answers

8
New cards

How does dig work?

resolves names through the resolver libraries that are located on the OS

9
New cards

Dig query types

ANY, A, AAAA, CNAME, MX, SOA, NS, PTR

10
New cards

What does multiple IPs mean in dig

load balancer

11
New cards

Dig errors

NO ERROR, SERVFAIL, NXDOMAIN, REFUSED

12
New cards

Cyber Kill Chain Framework

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Action on Objectives

13
New cards

Enumeration

a technique that establishes a numeric understanding of the target and enables the identification and collection of important information about the target devices, users, networks and network resources; among other things.

14
New cards

Information gathering

gathering as much data as possible pertaining to a target(s).

15
New cards

Identify

key term for information gathering. To establish or indicate the who’s and the what’s

16
New cards

Exploit

to take advantage of a flaw/s or vulnerabilities within an OS.

17
New cards

Different types of exploit

Code - taking advantage of a flaw within a program’s instructions and manipulating it in a manner that was not intended by the creators.

Misconfiguration - a system’s setting that allows it to be manipulated by an unintended source

Human - poor OPSEC, cyber training, or restrictions in place.