What are the steps for the 3-way handshake
1. I start a connection with SYN
2. If you want to talk, respond with SYN / ACK
3. I respond with ACK and start sending data.
OS fingerprinting accuracy increases by measuring small inconsistencies like DF bit settings and TCP window scaling, which differ because OS vendors implement the TCP/IP ______ differently.
stack
A software tool that enumerates and fingerprints devices in a network to identify vulnerabilities
Network scanner
What’s the order of writing the nmap command (write it on your whiteboard)
command
option
network ID
subnet mask
In Zenmap under the ____ you can find the ports that are open for attackers or other devices to access
Ports/Hosts
What does the DNS A record type store?
IPv4 address
Using Google’s advanced search operators only, you construct a query that searches exclusively U.S. government websites for PDF documents that contain full Gmail addresses in their text, and are hosted on webpages whose title includes the exact phrase ‘infrastructure vulnerability assessment’ by:
site:.gov filetype:pdf "@gmail.com" intitle:"infrastructure vulnerability assessment"
Nmap’s host discovery leverages ARP requests because ARP operates at OSI Layer ______ and cannot be filtered by standard host-based firewalls.
2
What does the DNS TXT record type provide?
Additional text in the DNS record with info like software used or secure email protocols
nslookup google.com will return (example or exact details both acceptable)
Server: dns.google
Address: 8.8.8.8
Non-authoritative answer:
Name: google.com
Addresses: 142.250.190.78
2607:f8b0:4009:80b::200e
<your DNS resolver’s hostname>, address <your DNS resolver’s IP>, Non-authoritative answer (name of domain), and address (IPv4 format of domain)
In Nmap, a closed port responding with RST/ACK indicates that no application is bound to the port, but the host machine itself is ______
active/reachable
What does the DNS SOA record type provide?
Administrator contact for domain or parent domain
What subnet does /16 translate to in 192.1680.50.0 /16?
255.255.0.0
In cybersecurity terms there’s no place like home is translated to there’s no place like _______
127.0.0.1
What is Network Segmentation?
Customizing the size of a network through the use of subnet masks or specialized switches.