Servers

Home > Preview

The flashcards below were created by user miacis on FreezingBlue Flashcards.


  1. Port # FTP
    21
  2. Port # Telenet
    23
  3. Port # HTTP
    80
  4. Port # SMTP
    25
  5. Port # POP3
    110
  6. Port # HTTPS
    443
  7. SCANNING TYPES
    PORT, NETWORK, AND VULNERABILITY
  8. WELL KNOWN PORTS
    0- 1023
  9. REGISTERED PORTS
    1024 - 49151
  10. DYNAMIC PORTS
    49152 - 65535
  11. WHAT FOLDERS ARE THE WELL-KNOWN PORT NUMBERS LOCATED?
    c:\WINDOWS\SYSTEM32\DRIVERS\ECT\SERVICES FILE

    TO VIEW IT SHOW HIDDEN FILES AND OPEN W/ NOTEPAD
  12. Port # GLOBAL CATALOG SERVER (TCP)
    3239 AND 3268
  13. Port # LDAP Server (TCP/UDP)
    389
  14. Port # LDAP SSL (TCP\UDP)
    636
  15. Port # IPsec ISAKMP (UDP)
    500
  16. Port # NAT-T (UDP)
    4500
  17. Port # RPC (TCP)
    135
  18. PORT # ASP.NET SESSION STATE (TCP)
    42424
  19. PORT # NETBOIS DATAGRAM SERVICE (UDP)
    137 AND 138
  20. NETBIOS SESSION SERVICES PORT #
    139
  21. SERVER # FOR

    DHCP (UDP)
    67
  22. SERVER # FOR

    LDAP (TCP/UDP)
    389
  23. SERVER # FOR

    SMB (TCP)
    445
  24. SERVER # FOR

    RPC (TCP)
    135
  25. SERVER # FOR

    DNS (TCP\UDP)
    53
  26. SERVER # FOR

    IMAP (TCP)
    143
  27. SERVER # FOR

    IMAP over SSL (TCP)
    993
  28. SERVER # FOR

    POP3 (TCP)
    110
  29. SERVER # FOR

    POP3 over SSL (TCP)
    995
  30. SERVER # FOR

    RPC (TCP)
    135
  31. SERVER # FOR

    RPC over HTTPS (TCP)
    443 OR 80
  32. SERVER # FOR

    SMTP (TCP\UDP)
    25
  33. CEH METHODOLOGY SCANNING
    • CHECK FOR LIVE SYSTEMS
    • CHECK FOR OPEN PORTS
    • SERVICE IDENTIFICATION
    • BANNER GRABBING/ OS FINGERPRINTING
    • VULNERBILITY SCANNING
    • DRAW NETWORK DIAGRAMS OF VULNERABLE HOSTS
    • PREPARE PROXIES
    • ATTACK
  34. WHAT IS THE ACCTUAL TERM FOR A PING SWEEP?
    ICMP SCAN
  35. WHAT ARE THE BENEFITS OF ICMP SCANS?
    THEY CAN RUN PARELLEL AND SCAN ALL SYSTEMS AT ONCE. tHIS WILL RUN IT QUICKLY.

    DOWNSIDE; ITS EASLY PICKED OUT BY ANY FIREWALL.
  36. WHAT ARE THE 4 BASIC ELEMENTS OF SECURITY?
    • CONFIDENTIALITY
    • AUTHENTICITY
    • INTEGRITY
    • AVAILABILTY
  37. WHAT IS A DOS ATTACK
    DENIAL OF SERVICE ATTACK
  38. WHAT IS A THREAT?
    AN ENVIROMENT OR SITUATION WHICH COULD LEAD TO A BREACH OF SECURITY
  39. WHAT IS AN EXPLOIT?
    AN PIECE OF SOFTWARE OR TECH THAT TAKES ADVANTAGE OF A BUG OR GLITCH LEADING TO UNAUTHROIZED ACESS, PRIVILAGE ESSCULATION, OR DENIAL OF SERVICE ON A COMPUTER SYSTEM.
  40. WHAT IS A VOLUNERABILITY?
    THE EXISITANCE OF A SOFTWARE FLAW, LOGIC DESIGN, OR IMPLEMATION ERROR THAT CAN LEAD TO AN UNEXPECTED AND UNDESIRABLE EVENT EXECUTING BAD AND DAMAGING INSTRUCTIONS TO THE SYSTEM.

Card Set Information

Author:
miacis
ID:
149434
Filename:
Servers
Updated:
2012-04-27 16:46:21
Tags:
CEH CHFI Computer Security
Folders:

Description:
Scanning and Enumeration
Show Answers:

What would you like to do?

Home > Flashcards > Print Preview