CEH
Unix and Linux Enumeration 139 By default the SNMP protocol tends to contain two passwords used to both configure and read the i ...
140 Chapter 6 ■ Enumeration of Services Unix and Linux commands are case sensitive in most situations, so when entering a comman ...
LDAP and Directory Service Enumeration 141 Enum4linux One tool worth looking at is enum4linux, which allows for the extraction o ...
142 Chapter 6 ■ Enumeration of Services Directory services that make use of LDAP include: ■ Active Directory ■ Novell eDirectory ...
SMTP Enumeration 143 The following commands can be used against an NTP server: ■ ntpdate ■ ntptrace ■ ntpdc ■ ntpq SMTP Enumerat ...
144 Chapter 6 ■ Enumeration of Services The previous code used VRFY to validate the user accounts for linking and zelda. The ser ...
Summary 145 HELO 501 HELO requires domain address HELO x 250 server1 Hello [10.0.0.72], pleased to meet you MAIL FROM:link 250 l ...
146 Chapter 6 ■ Enumeration of Services Exam Essentials Understand the process of enumeration. Make sure you can identify the pr ...
Review Questions 147 Review Questions Enumeration is useful to system hacking because it provides which of the following: A. P ...
148 Chapter 6 ■ Enumeration of Services An attacker can use to enumerate users on a system. A. NetBIOS B. TCP/IP C. NetBEUI D. ...
Review Questions 149 SNScan is used to access information for which protocol? A. SMTP B. FTP C. SMNP D. HTTP SMTP is used to ...
150 Chapter 6 ■ Enumeration of Services What is a SID used to do? A. Identify permissions B. Identify a domain controller C. Id ...
Gaining Access to a System CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓ III. Security ■ O. Vulnerabilities ✓ IV. Tools/Systems ...
Using the information gathered so far, you can now transi- tion into the next phase: gaining access to a system. All the informa ...
Up to This Point 153 ■ Facility information ■ Job information Footprinting shows you the amount of information that is left lyin ...
154 Chapter 7 ■ Gaining Access to a System ■ Passwords ■ Hidden shares ■ Device information ■ Network layout ■ Protocol informat ...
Up to This Point 155 Here are some examples of passwords that lend themselves to cracking: ■ Passwords that use only numbers ■ P ...
156 Chapter 7 ■ Gaining Access to a System to test different words in an attempt to recover the password. Systems that use passp ...
Up to This Point 157 Passive Online Attacks A passive online attack, as you’ve learned, is one in which the attacker tends to be ...
158 Chapter 7 ■ Gaining Access to a System is to inject the captured information—such as a password—back onto the network and di ...
«
5
6
7
8
9
10
11
12
13
14
»
Free download pdf