Network Based Attacks
๐ฉ CTFs & Labs ๐งช¶
โ Quizzes¶
Networking Fundamentals¶
Question | Answer |
---|---|
What is a 'host' in computer networks? | A computer or device on a network |
Which of the following best describes the OSI model? | A conceptual framework that standardizes networking functions |
What is the role of the presentation layer in the OSI model? | To handle data format translation, encryption, and compression |
What is contained in the header of a network packet? | Important information about the packet like source and destination |
What is the primary goal of networking? | To allow different systems to communicate with one another |
Which layer of the OSI model is responsible for logical addressing and routing? | The Network layer |
Firewall Detection & IDS Evasion¶
Question | Answer |
---|---|
How can nmap be configured to appear as though a scan is originating from a DNS server? | By setting the source port to 53 using the '-g' option |
What command can be used to disable DNS resolution in nmap? | -n |
Why is it beneficial to specify a custom MTU size when fragmenting packets? | To control how packets are broken up and sent, making it harder for IDS to detect the patterns |
What is the primary purpose of using the '-sA' scan in nmap? | To determine if ports are filtered or unfiltered by sending ACK packets |
What is the benefit of using decoy IP addresses in an nmap scan? | To mask the originating IP address and add confusion for network defenders |
Which nmap option can be used to fragment packets to evade IDS detection? | -f |
Network Enumeration¶
Question | Answer |
---|---|
What should be the focus during service enumeration according to the penetration testing methodology? | Analyzing services running on open ports. |
What is the primary goal of service enumeration in network penetration testing? | To gather detailed information about services running on open ports. |
Why is enumeration one of the most important phases of a penetration test? | It helps in identifying service misconfigurations that could lead to exploitation. |
How does enumeration differ from the initial host discovery and port scanning phases? | It involves deeper interaction with specific services. |
Why is enumeration considered an active information gathering technique? | It involves direct interaction with target systems. |
During the enumeration phase, which types of information are typically targeted? | Shares and account names |
SMB & NetBIOS Enumeration¶
Question | Answer |
---|---|
Which tool is commonly used to perform basic NetBIOS enumeration? | nbtstat |
Which port does SMB use for direct communication, bypassing NetBIOS? | 445 |
Why do modern Windows networks primarily use SMB instead of NetBIOS? | SMB offers better performance and security |
Why is SMBv1 considered insecure? | It allows anonymous logons and has several security vulnerabilities |
What are the primary services offered by NetBIOS? | Name service, datagram service, and session service |
What is the primary purpose of SMB in Windows networks? | To facilitate network file sharing and resource access |
SNMP Enumeration¶
Question | Answer |
---|---|
What information can be gathered through SNMP enumeration? | All of the above |
What is the primary security improvement introduced with SNMPv3? | Encryption and message integrity |
What is the main purpose of the Simple Network Management Protocol (SNMP)? | To manage and monitor network devices |
Which component of SNMP is responsible for querying and interacting with SNMP agents on network devices? | SNMP manager |
Which UDP port is used for sending SNMP traps or notifications? | 162 |
Which tool can be used to discover SNMP community strings via brute force? | Nmap with SNMP scripts |
SMB Relay Attack¶
Question | Answer |
---|---|
Which technique is commonly used by attackers to intercept SMB traffic for a relay attack? | ARP spoofing |
Why is DNS spoofing used in an SMB relay attack? | To redirect all SMB requests to the attacker's machine |
What type of data does an attacker aim to capture during the authentication step of an SMB relay attack? | NTLM hashes |
Which tool is often used in Metasploit for setting up SMB relay attacks? | smbrelay |
In the final step of an SMB relay attack, what could an attacker potentially gain access to? | Administrative privileges on a server |
What is an SMB relay attack primarily used for? | To intercept and relay SMB traffic to gain unauthorized access to resources |