Chapter 5: Scanning Networks 421
Chapter 5: Scanning Networks
- A. Telnet is used to perform banner grabs against a system. However, other tools are avail-
able to do this as well. - B. Netcraft is used to gather information about many aspects of a system, including operat-
ing system, IP address, and even country of origin. - D. Nmap is a utility used to scan networks and systems and for other types of custom scans.
- D. END is not a type of flag. Valid flags are ACK, FIN, SYN, and PSH.
- A. Syn flags are seen only on TCP-based transmissions and not in UDP transmissions of
any kind. - B. A NULL scan has no flags configured on its packets.
- B. An ACK flag is part of the last part of the three-way handshake, and this part never hap-
pens in a half-open scan. - B. An RST indicates that the port is closed.
- B. An RST indicates the port is closed in many of the TCP scan types. The RST is sent in
response to a connection request and the RST indicates that the port is not available. - A. The three-way handshake happens at the beginning of every TCP connection.
- C. A three way handshake is part of every TCP connection and happens at the beginning of
every connection. In the case of a half-open scan, however, a final ACK is not sent therefore
leaving the connection halfway complete. - A. A three-way handshake is part of every TCP connection and happens at the beginning
of every connection. It includes the sequence SYN, SYN-ACK, and ACK to be fully com-
pleted. - A. An ICMP echo scan is a ping sweep type scan.
- D. Vulnerability scans are designed to pick up weaknesses in a system. They are typically
automated. - C. A proxy is used to hide the party launching a scan.
- B. Tor is designed to hide the process of scanning as well as the origin of a scan. Addition-
ally, it can provide encryption services to hide the traffic itself. - A. You do not need to use a proxy to perform scanning, but using one will hide the process
of scanning and make it more difficult to monitor by the victim or other parties. - B. Vulnerability scanners are necessary for a security person to use in order to assist them
in strengthening their systems by finding weaknesses before an attacker does.
bapp01.indd 421 22-07-2014 10:56:35