Servers

Card Set Information

Author:
miacis
ID:
149434
Filename:
Servers
Updated:
2012-04-27 12:46:21
Tags:
CEH CHFI Computer Security
Folders:

Description:
Scanning and Enumeration
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user miacis on FreezingBlue Flashcards. What would you like to do?


  1. Port # FTP
    21
  2. Port # Telenet
    23
  3. Port # HTTP
    80
  4. Port # SMTP
    25
  5. Port # POP3
    110
  6. Port # HTTPS
    443
  7. SCANNING TYPES
    PORT, NETWORK, AND VULNERABILITY
  8. WELL KNOWN PORTS
    0- 1023
  9. REGISTERED PORTS
    1024 - 49151
  10. DYNAMIC PORTS
    49152 - 65535
  11. WHAT FOLDERS ARE THE WELL-KNOWN PORT NUMBERS LOCATED?
    c:\WINDOWS\SYSTEM32\DRIVERS\ECT\SERVICES FILE

    TO VIEW IT SHOW HIDDEN FILES AND OPEN W/ NOTEPAD
  12. Port # GLOBAL CATALOG SERVER (TCP)
    3239 AND 3268
  13. Port # LDAP Server (TCP/UDP)
    389
  14. Port # LDAP SSL (TCP\UDP)
    636
  15. Port # IPsec ISAKMP (UDP)
    500
  16. Port # NAT-T (UDP)
    4500
  17. Port # RPC (TCP)
    135
  18. PORT # ASP.NET SESSION STATE (TCP)
    42424
  19. PORT # NETBOIS DATAGRAM SERVICE (UDP)
    137 AND 138
  20. NETBIOS SESSION SERVICES PORT #
    139
  21. SERVER # FOR

    DHCP (UDP)
    67
  22. SERVER # FOR

    LDAP (TCP/UDP)
    389
  23. SERVER # FOR

    SMB (TCP)
    445
  24. SERVER # FOR

    RPC (TCP)
    135
  25. SERVER # FOR

    DNS (TCP\UDP)
    53
  26. SERVER # FOR

    IMAP (TCP)
    143
  27. SERVER # FOR

    IMAP over SSL (TCP)
    993
  28. SERVER # FOR

    POP3 (TCP)
    110
  29. SERVER # FOR

    POP3 over SSL (TCP)
    995
  30. SERVER # FOR

    RPC (TCP)
    135
  31. SERVER # FOR

    RPC over HTTPS (TCP)
    443 OR 80
  32. SERVER # FOR

    SMTP (TCP\UDP)
    25
  33. CEH METHODOLOGY SCANNING
    • CHECK FOR LIVE SYSTEMS
    • CHECK FOR OPEN PORTS
    • SERVICE IDENTIFICATION
    • BANNER GRABBING/ OS FINGERPRINTING
    • VULNERBILITY SCANNING
    • DRAW NETWORK DIAGRAMS OF VULNERABLE HOSTS
    • PREPARE PROXIES
    • ATTACK
  34. WHAT IS THE ACCTUAL TERM FOR A PING SWEEP?
    ICMP SCAN
  35. WHAT ARE THE BENEFITS OF ICMP SCANS?
    THEY CAN RUN PARELLEL AND SCAN ALL SYSTEMS AT ONCE. tHIS WILL RUN IT QUICKLY.

    DOWNSIDE; ITS EASLY PICKED OUT BY ANY FIREWALL.
  36. WHAT ARE THE 4 BASIC ELEMENTS OF SECURITY?
    • CONFIDENTIALITY
    • AUTHENTICITY
    • INTEGRITY
    • AVAILABILTY
  37. WHAT IS A DOS ATTACK
    DENIAL OF SERVICE ATTACK
  38. WHAT IS A THREAT?
    AN ENVIROMENT OR SITUATION WHICH COULD LEAD TO A BREACH OF SECURITY
  39. WHAT IS AN EXPLOIT?
    AN PIECE OF SOFTWARE OR TECH THAT TAKES ADVANTAGE OF A BUG OR GLITCH LEADING TO UNAUTHROIZED ACESS, PRIVILAGE ESSCULATION, OR DENIAL OF SERVICE ON A COMPUTER SYSTEM.
  40. WHAT IS A VOLUNERABILITY?
    THE EXISITANCE OF A SOFTWARE FLAW, LOGIC DESIGN, OR IMPLEMATION ERROR THAT CAN LEAD TO AN UNEXPECTED AND UNDESIRABLE EVENT EXECUTING BAD AND DAMAGING INSTRUCTIONS TO THE SYSTEM.

What would you like to do?

Home > Flashcards > Print Preview