An IPv4 Address Looks Like
An IPv4 Address Looks Like
Which record will reveal information about a mail server for a domain?
• Answer: WHOIS.
What can be configured in most search engines to monitor and alert you of changes to
content?
If you can't gain enough information directly from a target, what is another option?
• Answer: Traceroute.
Which of the following is the best search engine to find all Linksys WRT54G routers
attached to the internet?
• Answer: Shodan.
In Google Hacking, what would you use to find all PDF documents within HCC's
website?
In Google Hacking, what would you use to find all webservers with Directory Browsing
enabled?
What file is available on most websites that tells you about portions of the website that
may be sensitive in an administrator's attempt to "secure" the site?
• Answer: robots.txt.
Using the Harvester, what command would allow me to search for the first 500 google
results for HCC email addresses?
• Answer: theharvester -d HCC.edu -l 500 -b google
Using the Harvester, what command would allow me to search for the first 200 Linkedin
results for Microsoft employees?
• Answer: Netcat.
• Answer: Nmap.
• Answer: Stealth.
• Answer: TCP.
Which of the following types of attack has no flags set?
**Answer:** The ACK (Acknowledgment) from the initiator to complete the 3-way handshake.
**Answer:** It is a method used in a TCP/IP network to create a connection between a local host/client
and server. It involves three steps: SYN, SYN-ACK, ACK.
A full-open scan means that the three-way handshake has been completed. What is the difference
between this and a half-open scan?
**Answer:** A full-open scan completes the entire handshake process, while a half-open scan does not
send the final ACK to the target.
**Answer:** It is a type of scan where an ICMP echo request packet (ping) is sent to the target, and a
response indicates the host is alive.
**Answer:** It is a scan that identifies and classifies security weaknesses in a computer, network, or
infrastructure.
**Answer:** A proxy acts as an intermediary for requests from clients seeking resources from other
servers, providing anonymity, security, and content control.
**Answer:** TOR (The Onion Router) is used for anonymous communication over the internet.
**Answer:** Reveal information about a system or service, including its type, version, and other
relevant details.
In TCP/IP, what is the correct way to open a connection to a remote system using the 3-way handshake?
**Answer:** Send a SYN packet, wait for a SYN-ACK response, and then send an ACK packet.
In TCP/IP, what is the correct way to close a connection with a remote system using the 3-way
handshake?
Which NMAP scan type attempts to complete the 3-way handshake with each scanned port?
Which NMAP scan type only sends the initial SYN request and waits for an ACK to detect the open port?
A NMAP scan type with FIN, URG, and PUSH code bits set is which type of scan type?
**Answer:** XMAS tree scan.
When using a NMAP TCP FIN (-sF) scan type, what response indicates the port may be open?
Which NMAP scan type allows an attacker to get past some packet filtering devices?
Which of the following NMAP command line strings will scan a full class C network, perform version
detection, and output to a file?
Which NMAP -T option would you use in a network where you want to minimize any detection and
potential unintended consequences of your scan?
Which NMAP -T option would you use in a network where you need to find out as much information as
quick as possible but don't want to encounter any traffic loss?
Which of the following NMAP command line strings will scan a target for specific web ports, and perform
version detection of those ports?
**Answer:** Detailed information about the target system, such as user names, group names, network
resources, and other potential vulnerabilities.
- Answer: 53
- Answer: nbtstat
- Answer: SNMP
14. **What personal software inspection tool can you use to scan your own system to ensure your
applications are up to date?**
15. **What Microsoft based tool can you use to scan your Windows system to check for security
issues?**
16. **What network based vulnerability scanner can be used to audit your systems for vulnerabilities, as
well as compliance checks?**
- Answer: Nessus
- Answer: Exploitation
- A brute-force attack is performed by systematically trying every possible combination until the correct
one is found.
- Dictionary attack
- Backdoor
- Hash
- LM (LanMan) hash
- Syskey
Which system should be used instead of LM or NTLM?
- Kerberos
- NTLM is more secure due to its stronger encryption methods compared to LM.
- Auditpol
- LM hash
- NTFS
What is an exploit?
- An exploit is a piece of software, data, or sequence of commands that takes advantage of a
vulnerability to cause unintended behavior in computer software or hardware.
- There are many, including buffer overflows, SQL injection, cross-site scripting, etc.
- HD Moore
- Perl
- Ruby
- Rapid7
- An auxiliary module
In Metasploit, the Meterpreter shell is an example of what?
- Payload
In Metasploit, what command do you use to list the sessions of the systems you have exploited?
- `sessions`
Given the following set of Metasploit Commands, which command is missing in order to make this work?
- (You haven't provided a list of commands. I would need them to answer this.)
When using Meterpreter, what command shows all processes on the remote system?
- `ps`
When using Meterpreter, what command provides you with the Windows Password store?
- `hashdump`
- Armitage