NMAP/PACKET ANALYSIS
SOUNDS A PIG MAKES
SUCKURITY
I-SPY
IM-PRACTICAL (each question is a race)
100

In what scenario would you receive an "ICMP unreachable" response when performing port scans?

UDP Connect & the port is closed

100

What are the three primary modes of SNORT?

- Sniffer mode

-Packet Logger Mode

-Network Intrusion Detection Mode

100

An IDS is typically deployed where on the network?

behind the firewall on the edge of the network.

100

THIS is a device or program that is (generally) compromised/controlled by a hacker or external entity to perform any instruction provided.

Bot

100

Using the UTC time of day (01:23:45. 67890123) format, what time was the 1994th packet of the PCAP Scan_222.pcap sent?

13:56:54.247816

200

What type of symmetric encryption does CryptCat utilize?

Twofish (uses one 256-bit key)

200

List IN ORDER the rule header of a SNORT rules.

[ACTION] [PROTOCOL] [SOURCE IP] [SOURCE PORT] -> [DEST IP] [DEST PORT]

200

Name 3 types of internet security protocols that operate from layers 4 and up on the OSI model.

SSL, TLS, SSH

200

Government Sponsored Organizations, Nation State, Companies Performing Intellectual Property theft are all examples of what classification of hackers?

Advanced Persistent Threat (APT)

200

In your Practical_Hashes_03 file you downloaded, there are multiple files sourced from one machine. find the filenames of the collision among them. 

300.47.jpeg, 300.150.jpeg

300

What type of exploit is represented in this photo:

Connect back (reverse shell)

300

What are the two measurements do we use to identify latency?

Round Trip Time (RTT)

Time to first byte (TTFB)

300

What firewall topology is the most common for home networks?

Classic FIrewall Architecture

300

What phases of the malware life cycle did we discuss in class?

Dormant, Propagation, Triggering, Execution

300

What is the SID of the SNORT rules that will alert you with a message that says "FTP large SYST command" ?

1625

400

In IPv6 THIS is the process by which a host configures its own IP address based on it's MAC address.

SLAAC (Stateless Address Autoconfiguration)

400

Instead of using ARP, IPv6 utilizes what protocol?

Neighbor Discovery Protocol (NDP)

400

What bit encryption is used with Common Access Cards?

2048

400

DAILY DOUBLE!!!!

Name the three branches of the military that have never had an insider threat (at least to our knowledge)

400

Create a SNORT rule that will alert you when anyone from the 10.125.80.0/24 network attempts to connect using SNMP ports on your internal network. You want the alert to say "Not so simple mail" with the sid being the first local rule on your system. This will be the 4th revision.

alert tcp 10.125.80.0/24 any -> $HOME_NET [161,162] (msg:"Not so simple mail"; sid:1000000; rev:4;)

500

THIS IS A RACE!!

Two members of the team must create a NetCat connection and successfully send "Hello, World" from one member of the team to the other.

500 points for you!

500

THIS IS A RACE!!!

In the default snort configurations you downloaded, what ports are associated with the variable SHELLCODE_PORTS?

!80

500

When going into work, you must be wanded by the security team,  badge in and put in your pin to enter the door. Once at your work station, your computer activity is logged and monitored. All of these components play a part in what?

Defense in Depth

500

What are the 4 different types of threats we discussed in the Mobile Tech lesson?

Mobile Application Security Threats

Web-Based Mobile Security Threats

Mobile Network Security Threats

Mobile Physical Device Security Threats

500
In your Scan_222.pcap what is the port state of port 31337?

Open

M
e
n
u