Network Reconnaissance
9 important questions on Network Reconnaissance
What are the two fundamental approaches in the first step of reconnaissance?
What would be the first step of active reconnaissance?
How is the global IP address space managed?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
How do you call a reversed DNS lookup?
What is a common technique to get router-level maps when doing network reconnaissance
What can be concluded if with a traceroute lookup a probe is consistently returned within 2 milliseconds?
Give 3 examples of inverse scans, why are these unusual scans used?
Is used because it might be possible to stay under the radar and remain undetected.
What are the two disadvantages of a TCP connection scan, what is an alternative?
2) Operating system will pass the connection to the network application, thus potentially leave some trace in the log files.
Alternative is a SYN scan.
What 3 characteristic can be analysed to look what operating system is used?
- TTL value in IP header
- TCP window size
- Initial TCP acknowledgement number
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding