Footprinting & Scanning
๐ฉ CTFs & Labs ๐งช¶
โ Quizzes¶
Active Information Gathering¶
Question | Answer |
---|---|
What is the primary focus of footprinting in the reconnaissance phase? | Collecting detailed information about the target's network and systems |
Which type of reconnaissance involves collecting information from publicly available sources, such as websites, social media, and public records? | Passive Reconnaissance |
Networking Fundamentals¶
Question | Answer |
---|---|
Which layer of the OSI model is responsible for end-to-end communication, flow control, and error correction? | Transport Layer |
Which layer of the OSI model is responsible for translating data between the application and lower layers, including encryption and compression? | Presentation layer |
What is the primary responsibility of the Network layer in the OSI model? | Logical addressing and routing |
Network Layer¶
Question | Answer |
---|---|
Which protocol operates at the Network layer and is commonly used for logical addressing and routing on the Internet? | IP |
What is the purpose of the TTL (Time-to-Live) field in the IP header at the Network layer? | To limit the number of hops a packet can take through the network |
Transport Layer - Part 2¶
Question | Answer |
---|---|
How many packets are exchanged during the TCP three-way handshake? | 3 |
What is the primary role of the UDP (User Datagram Protocol) in the Transport layer? | Fast and connectionless communication |
Network Mapping¶
Question | Answer |
---|---|
What is the significance of network mapping in the reconnaissance phase of penetration testing? | It provides a blueprint of the target network architecture |
Host Discovery Techniques¶
Question | Answer |
---|---|
Which host discovery technique involves sending ICMP Echo Request packets to potential hosts and analyzing their responses? | Ping Sweeping |
Ping Sweeps¶
Question | Answer |
---|---|
In ping sweeping, what is the purpose of adjusting the Time To Live (TTL) value in ICMP packets? | To limit the number of hops |
Host Discovery With Nmap - Part 2¶
Question | Answer |
---|---|
What is the purpose of the "-PE" option in Nmap's host discovery scans? | To perform a ping sweep using ICMP Echo Request |
Which Nmap option is commonly used for host discovery and sends ICMP Echo Request packets to determine the status of a host? | -sn |
Firewall Detection & IDS Evasion¶
Question | Answer |
---|---|
Which Nmap option is specifically designed for firewall evasion by splitting large packets into smaller fragments? | -f |
Nmap Output Formats¶
Question | Answer |
---|---|
Which Nmap output format is best for quick text parsing using tools like sed and awk? | -oG |