Involves an attacker creating active connections with a target system and performing directed queries to gain more info about the target.
What is enumeration?
a command-line-oriented network scanning and packet crafting tool for the TCP/IP protocol that sends ICMP echo request and supports TCP, UDP, ICMP, and raw-IP protocols
What is Hping2/Hping3?
______ extracts LM and NTLM password hashes of local user accounts from the Security Account Manager database.
pwdump7
What is aqua?
a fast symmetric key block cipher designed by ronald rivest for for RSA data security. It is a parameterized algorithm with a variable block size. variable key size, and a variable number of rounds.
What is RC5?
TCP/UDP Port 162
What is SNMP Trap?
a mobile app for andriod and iOS that scans and provides complete network info, such as IP address, MAC address, device vendor, and ISP location.
What is Fing?
a tool designed to audit passwords and recover applications. It recovers lost Microsoft Windows passwords with the help of a dictionary, hybrid, rainbow table, and brute-force attacks, and it also checks the strength of the password.
what is L0phtCrack?
An open source technology used for developing, packaging, and running applications and all its dependencies in the form of containers, to ensure that the application works in a seamless environment. ***sips coffee*** 0_O
What is docker?
Type of symmetric block cipher algorithm designed to replace DES or IDEA algorithms. It uses the same secret key to encrypt and decrypt data. It splits the data into a block length of 64 bits and produces a key ranging from 32 to 448 bits.
What is blowfish?
What is DNS cache snooping?
ping sweep tool that pings each IP address to check if any of these address are live. Then it optionally resolve hostnames, determines the MAC address, scan ports, etc.
what is angry ip scanner?
a technique where a random string of characters are added to the password before calculating their hashes
what is password salting?
What is kubernetes?
Symmetric-key block cipher designed by a bunch of dudes named ross anderson (not ross like of ross and rachel from friends), eli biham (probably not mr. robot eli), and lars knudsen. It uses a 128 bit cipher with key sizes of 128, 192. 256 bits. It can be integrated into software or hardware without restrictions. It involves 32 rounds of computational operations that include substitution and permutation operations on four 32 bit word blocks using 8 variable 5-boxes with 4 bits entry and 4 bit exit.
What is Serpent?
rusers, rwho, and finger can be used to perform this enumeration
What is Unix/Linux User Enumeration?
in this scan attackers send a TCP frame to a remote device with FIN, URG, and PUSH flags set. Is a type of inverse TCP scanning technique.
What is an Xmas Scan?
A woodchuck would chuck as much wood as a woodchuck could chuck if a woodchuck could chuck wood.
How much wood would a woodchuck chuck if a woodchuck could chuck wood?
This OWASP Top 10 cloud security risk describes how unsecured data in transit is susceptible to eavesdropping and interception attacks. "Organizations must ensure proper protection when proprietary data are transferred from the end-user to the cloud data center."
What is R6 Service and Data Integration?
Voiceless it cries,
Wingless flutters,
Toothless bites,
Mouthless mutters.
What is wind?
Enables attackers to exploit identified vulnerabilities and perform brute-force attacks to gain unauthorized access to the target and lunch further attacks.
What is Telnet Enumeration?
type of scan where attackers send FIN/ACK probes, and if there is no response, then the port is Open|Filtered, but if an RST packet is sent in response then the port is closed.
What is a TCP Maimon scan?
this type of rootkit replaces the original system calls with fake ones to hide info about the attacker
what is a library level rootkit?
This is a serverless security platform that provides complete lifecycle security to serverless applications from deployment to runtime. It allows clients to control the serverless platform within 20 minutes. It also allows to continuously scan severless infrastructure, code, and runtime environment, to collect and correlate hundreds of data points.
What is protego?
Also a symmetric key block cipher with with 18 or 24 rounds. Its a part of the TLS protocol. It cannot be brute-forces even with the latest tech. It is a feistel cipher working with 128 bit blocks and has key sizes of 128, 192, and 256 bits.
What is camellia?