Skip to content

Network Based Attacks


๐Ÿšฉ CTFs & Labs ๐Ÿงช


โ” Quizzes

Networking Fundamentals

Question Answer
What is a 'host' in computer networks? A computer or device on a network
Which of the following best describes the OSI model? A conceptual framework that standardizes networking functions
What is the role of the presentation layer in the OSI model? To handle data format translation, encryption, and compression
What is contained in the header of a network packet? Important information about the packet like source and destination
What is the primary goal of networking? To allow different systems to communicate with one another
Which layer of the OSI model is responsible for logical addressing and routing? The Network layer

Firewall Detection & IDS Evasion

Question Answer
How can nmap be configured to appear as though a scan is originating from a DNS server? By setting the source port to 53 using the '-g' option
What command can be used to disable DNS resolution in nmap? -n
Why is it beneficial to specify a custom MTU size when fragmenting packets? To control how packets are broken up and sent, making it harder for IDS to detect the patterns
What is the primary purpose of using the '-sA' scan in nmap? To determine if ports are filtered or unfiltered by sending ACK packets
What is the benefit of using decoy IP addresses in an nmap scan? To mask the originating IP address and add confusion for network defenders
Which nmap option can be used to fragment packets to evade IDS detection? -f

Network Enumeration

Question Answer
What should be the focus during service enumeration according to the penetration testing methodology? Analyzing services running on open ports.
What is the primary goal of service enumeration in network penetration testing? To gather detailed information about services running on open ports.
Why is enumeration one of the most important phases of a penetration test? It helps in identifying service misconfigurations that could lead to exploitation.
How does enumeration differ from the initial host discovery and port scanning phases? It involves deeper interaction with specific services.
Why is enumeration considered an active information gathering technique? It involves direct interaction with target systems.
During the enumeration phase, which types of information are typically targeted? Shares and account names

SMB & NetBIOS Enumeration

Question Answer
Which tool is commonly used to perform basic NetBIOS enumeration? nbtstat
Which port does SMB use for direct communication, bypassing NetBIOS? 445
Why do modern Windows networks primarily use SMB instead of NetBIOS? SMB offers better performance and security
Why is SMBv1 considered insecure? It allows anonymous logons and has several security vulnerabilities
What are the primary services offered by NetBIOS? Name service, datagram service, and session service
What is the primary purpose of SMB in Windows networks? To facilitate network file sharing and resource access

SNMP Enumeration

Question Answer
What information can be gathered through SNMP enumeration? All of the above
What is the primary security improvement introduced with SNMPv3? Encryption and message integrity
What is the main purpose of the Simple Network Management Protocol (SNMP)? To manage and monitor network devices
Which component of SNMP is responsible for querying and interacting with SNMP agents on network devices? SNMP manager
Which UDP port is used for sending SNMP traps or notifications? 162
Which tool can be used to discover SNMP community strings via brute force? Nmap with SNMP scripts

SMB Relay Attack

Question Answer
Which technique is commonly used by attackers to intercept SMB traffic for a relay attack? ARP spoofing
Why is DNS spoofing used in an SMB relay attack? To redirect all SMB requests to the attacker's machine
What type of data does an attacker aim to capture during the authentication step of an SMB relay attack? NTLM hashes
Which tool is often used in Metasploit for setting up SMB relay attacks? smbrelay
In the final step of an SMB relay attack, what could an attacker potentially gain access to? Administrative privileges on a server
What is an SMB relay attack primarily used for? To intercept and relay SMB traffic to gain unauthorized access to resources