CS6262 Exam Lecture Questions with 100%
Correct Verified Answers
Describe four C&C communication structures: - ANSWER IRC Channels: Single point of
failure, easy to locate and take down.
P2P Botnets: Distributed, master servers talk to the bots
Fast Flux DNS: Bots communicate back to a single domain name. The domain name
DNS : IP mapping changes every 10 seconds.
Random Domain Generation:
What tasks do spammers perform? - ANSWER • Build, curate, buy, and sell lists
of email addresses
• Send mail on behalf of other actors for a fee
• Traffic-PPI services looking to acquire traffic and infections
• Phishers looking to steal personal information
What is performed during "footprinting"? - ANSWER • Reconnaissance and information
gathering
• Find out target IP address/phone number range
• Namespace acquisition
• Network Topology (visualRoute)
• Essential to a "surgical" attack
What are common "footprinting" tools? - ANSWER • Google, search engine, Edgar
• Whois
• nslookup, dig, Sam Spade
What is the goal of "scanning"? - ANSWER • Which machine is up and what ports are
open
• Which services are running
, • Their versions and configurations
• Look up corresponding vulnerability info on the web
• Focus on most promising avenues of entry
• Reduce frequency of scanning and randomize the ports or IP addresses to
be scanned in the sequence
What are common tools used in "scanning"? - ANSWER Ping sweep -
Fping, icmpenum, WS_Ping, ProPack, nmap
TCP/UDP port scan - Nmap, superscan,
fscan OS Detection - Nmap, queso, siphon
What is the goal of "enumeration"? - ANSWER • Identify valid user accounts or poorly
protected resource shares
• More intrusive probing than scanning step
What tools are used for "enumeration"? - ANSWER List user accounts: Null
sessions, DumpACL, Sid2usre, onSiteAdmin
List file shares: Showmount, NAT, legion
Identify applications: Banner grabbing with telnet or netcat, rpcinfo
What tools are used for "gaining access"? - ANSWER Password eavesdropping:
tcpdump/ssldump, lophtcrack, readsmb
File share brute force: NAT, legion
Password file grabbing: tftp, pwddump2
Buffer Overflow: ttdb, bind, IIS, .HT/ISM.DLL
How does one gain access? (pen testing) - ANSWER Identify and exploit a vulnerability.
What tools can be used for privilege escalation? - ANSWER Password cracking: John
the ripper, L0phtcrack
Known Exploits: Lc_messages, Getadmin, sechole
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.