Attackers Techniques
Julie has been hired to perform a penetration test on xyz.com. She begins by looking at IP address ranges owned by the company and details of domain name registration. She then goes to news groups and financial websites to see whether any of the company’s sensitive information or technical details are online. What is Julie doing?
Passive Information Gathering
Which of the following is the most reliable type of scan?
Connect
If you send a SYN to an open port what is the correct response?
SYN/ACK
Trying to identify machines on a target network is called?
Enumeration
From a port scanning you identified that port 88 is open. What does this tell you?
The target system uses Kerberos authentication
Last updated