Information Gathering Flashcards

lesson 5 (36 cards)

1
Q

Which tool or method best allows testers to retrieve old versions of websites to gather potentially sensitive information that may have been removed from a current site?

A

WAYBACK MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which tool or method best allows testers to retrieve old versions of websites to gather potentially sensitive information that may have been removed from a current site?

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which technique involves sending requests to open ports to retrieve information about the software and version running on the system?

A

Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Nmap scan type is commonly referred to as a “half-open” scan because it does not complete the TCP handshake?

A

SYN scan
-sS
called half-open scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which tool or method allows testers to collect data from a website’s markup code and potentially uncover sensitive details such as server types or internal names?

A

HTML scraping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Passive Reconnaissance?

A

A technique in penetration testing used to gather information about a
target without direct interaction with its system

tools like: GitHub, Bitbucket, SourceForge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the risks using a Passive Reconnaissance?

A

Expose sensitive information (hostnames, IP addresses,
database servers, service configurations, credentials)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tools would you use for Searching for Images and Archived Websites?

A

Wayback Machine, web cache viewers, TinEye, Google Image Search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What dose the command dig do?

A

Query DNS records to retrieve information about domain
names, IP mappings, and other DNS-related data

Does not send traffic directly to the target’s systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Network Sniffing?

A

The process of capturing packets of data as they travel across a network

Gathering information about network topology and architecture

Identifying active hosts, services, and key communication
endpoints

Exposing weaknesses in network configurations and outdated
protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are IoT and OT Domain?

A

Deploying network sniffing technologies in the IoT and OT domain to monitor specialized protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IoT and OT Domain Specialized in Protocols:

A

MQTT (Message Queuing Telemetry Transport)- Used for lightweight messaging in IoT

Modbus- Used in industrial environments for primary/secondary
relationships between controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the IoT (Internet of Things)?

A

Network‑connected smart devices such as sensors, cameras, smart lights, and home automation systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the OT (Operational Technology) ?

A

Industrial systems that control physical processes, such as manufacturing equipment, power plants, water systems, and PLC controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the protocol MQTT (Message Queuing Telemetry Transport)?

A

A lightweight publish‑subscribe messaging protocol commonly used in IoT devices for efficient communication between sensors and controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the protocol Modbus?

A

A widely used industrial protocol in OT environments that enables communication between a master controller and multiple slave devices (e.g., PLCs, sensors, actuators).

17
Q

What is an Active Reconnaissance?

A

Involves directly interacting with the target’s systems to gather important
data

18
Q

What is the risks using Active Reconnaissance?

A

May alert the target that someone is assessing their security

19
Q

TCP Scanning:

A

Uses Transmission Control Protocol to find open ports and running services

Involves starting a handshake to see if a port is open

20
Q

SYN scan with Nmap sends a:

A

TCP SYN packet;
receiving a SYN-ACK response indicates an open port

21
Q

UDP Scanning:

A

Uses User Datagram Protocol to find open ports and running services

Sends UDP packets to various ports to determine status based on responses

22
Q

On a UDP scan, what dose No response indicates?

A

a blocked UDP port

23
Q

On a UDP scan, what dose ICMP port unreachable error suggests?

A

a closed port

24
Q

What are Banner Grabbing?

A

Gathers information about the software running on a network, including type and version

Involves connecting to a remote service and recording the banner
information sent back

25
What tools are used for banner grabbing?
Telnet, specialized scripts, curl command curl -I
26
TCP Scanning is a
Connection-oriented protocol; requires a connection to be established before data can be sent
27
What is SYN Scan (Half-open scan) scan?
Sends a SYN packet to a specific port on the target machine SYN-ACK response indicates the port is open Scanner sends an RST to abort the connection before it is fully established Popular for quickly determining port status without fully opening a connection
28
nmap -sS - what kind of scan dose it do?
SYN scan
29
UDP (User Datagram Protocol) scans are:
Connectionless protocol; sends packets without establishing a connection
30
nmap -sU -what kind of scan dose it do?
UDP scan
31
What are HTML Scraping?
Collecting data from a website's HTML code we can use the tools:Beautiful Soup (Python) and Browser inspection tools
32
What are Cached Pages?
Accessing stored versions of web pages that have been deleted or altered we can use tools like: Google cache and Wayback Machine
33
To use google Cache, you need
Use the "cache:" operator in Google search to find cached versions of web pages cache:https://en.wikipedia.org/wiki/Albert_Einstein
34
What are HTTP Header Sniffing:
Analyze HTTP headers for information about server types and configurations.
35
What kind of tools we use for Banner Grabbing?
wget -S netcat- echo -en "GET / HTTP/1.0\n\n" | nc 80 | grep Server nmap -sV --script=banner curl -I
36