Recon
Google Dorking
Subnet Masks
Nmap
100

to gather information to understand a target or situation before taking action

What is recon?

100

using advanced search operators to find specific, often hard-to-locate information 

What does google dorking refer to in the context of cybersecurity? 

100

a permanent, unique identifier for each network device

What is a MAC address? 

100

enumerates and fingerprints devices in a network to identify vulnerabilities

What is the primary purpose of Nmap?

200

Mapping the general network topology and identifying live hosts 

What is a goal of recon for attackers?

200

admin login pages and sensitive documents not properly secured 

What is an example of data that can be found using Google dorks? 

200

a temporary identifier for each interface on a network 

What is an IP address? 

200

identifies computers in a network and finds details such as services, hostnames, file shares, and usernames

What is enumeration? 

300

intitle: 

What advanced search operator is used to find search times in the title of a webpage?

300

32 bits represented in 4 sections separated by dots 

What is the format of an IPv4 address? 

300

sends a lot of packets to the target network and waits for responses like SYN/ACK from devices 

How does Nmap work to identify devices in a network? 

400

What advanced search operator is also known as a wildcard? 

400

0 to 255

What is the range for each octet of an IPv4 address? 
400

nmap -sT 

What is the port scan command? 

500

to gather info about websites to index pages and their contents 

Why do search engines send out automated bots to crawl the web? 

500

customizes the size of a network through the use of subnet masks or specialized switches 

What is network segmentation?

500

this type of scan in Nmap determines which operating system is being used by the host

What is the OS Detection scan?