Foot Printing
Foot Printing
Explanation:
Explanation:
Web server OS
Location of web servers
Publicly available email addresses
Usernames, passwords, and so on.
Smith, a professional hacker, has targeted an organization. He employed some
footprinting tools to scan through all the domains, subdomains, reachable IP addresses,
DNS records, and Whois records to perform further attacks.
What is the type of information Smith has extracted through the footprinting attempt?
Network information
Policy information
Explanation:
Traceroute analysis
Email tracking
Explanation:
Which of the following search engine tools helps an attacker use an image as a search
query and track the original source and details of images, such as photographs, profile
pictures, and memes?
TinEye
Intelius
Mention
Sublist3r
Explanation:
Intelius: Attackers can use the Intelius people search online service to search for
people belonging to the target organization.
Sublist3r: Sublist3r is a Python script designed to enumerate the subdomains of
websites using OSINT.
TinEye: Reverse image search Attackers use online tools such as Google Image
Search, TinEye Reverse Image Search, Yahoo Image Search, and Bing Image
Search to perform a reverse image search.
Mention: Mention is an online reputation tracking tool that helps attackers in
monitoring the web, social media, forums, and blogs to learn more about the
target brand and industry.
Which of the following deep and dark web searching tools helps an attacker obtain
information about official government or federal databases and navigate anonymously
without being traced?
ExoneraTor
Whitepages
Spokeo
Been Verified
Explanation:
ExoneraTor: Attackers can use deep and dark web searching tools such as Tor
Browser, ExoneraTor, and OnionLand Search engine to gather confidential
information about the target, such as credit card details, passports information,
identification card details, medical records, social media accounts, and Social
Security Numbers (SSNs).
Spokeo, Been Verified, and Whitepages are people search online services
Which of the following activities of a user on social networking sites helps an attacker
footprint or collect the identity of the user’s family members, the user’s interests, and
related information?
Creating events
Explanation:
The activities of users on social networking sites and the respective information that an
attacker can collect is summarized in the following table.
Explanation:
Examining the HTML source code: Attackers can gather sensitive information by
examining the HTML source code and following the comments that are inserted
manually or those that the CMS system creates. The comments may provide
clues as to what is running in the background. They may even provide the
contact details of the web developer or administrator. Observe all the links and
image tags to map the file system structure.
Examining Cookies
To determine the software running and its behavior, one can examine cookies set by the
server. Identify the scripting platforms by observing sessions and other supporting
cookies. The information about cookie name, value, and domain size can also be
extracted.
Which of the following is the direct approach technique that serves as the primary
source for attackers to gather competitive intelligence?
Social engineering
Explanation:
Direct Approach
The direct approach serves as the primary source for competitive intelligence
gathering. Direct approach techniques include gathering information from trade
shows, social engineering of employees and customers, and so on.
Indirect Approach
Which of the following tools is used for gathering email account information from
different public sources and checking whether an email was leaked using the
haveibeenpwned.com API?
Metagoofil
Infoga
Octoparse
Professional Toolset
Explanation:
Explanation:
Explanation:
Site operator restricts the results of those websites in the given domain.
For example, the [SQL Injection site:Wikipedia.org] query gives information on
SQL injection from the wikipedia.org site.
Intitle restricts the results to documents containing the search keyword in the title,
and double quotes around search terms restrict the results to the pages that
contain the exact search term.
Allinurl restricts the results to those pages with all of the search keywords in the
URL. This operator displays websites that are similar or related to the URL
specified.
Which Google search query will search for any files a target certifiedhacker.com may
have?
Explanation:
The “site” operator restricts the results to those websites in the given domain.
Filetype operator restricts the results to pages whose names end in suffix.
This operator restricts results to only those pages containing all the query terms
specified in the URL.
The query intext:term restricts results to documents containing term in the text.
Which of the following techniques is used to create complex search engine queries?
DuckDuckGo
Google hacking
Bing search
Yahoo search
Explanation:
Google hacking refers to use of advanced Google search operators for creating complex
search queries to extract sensitive or hidden information. The accessed information is
then used by attackers to find vulnerable targets. Footprinting using advanced Google
hacking techniques gathers information by Google hacking, a hacking technique to locate
specific strings of text within search results, using an advanced operator in the Google
search engine.
Which of the following tools consists of a publicly available set of databases that contain
personal information of domain owners?
Traceroute tools
Explanation:
WHOIS is a query and response protocol that is widely used for querying databases that
store the registered users or assignees of an Internet resource, such as a domain name, an
IP address block, or an autonomous system but is also used for a wider range of other
information. The protocol stores and delivers database content in a human-readable
format.
Whois Lookup tools extract information such as IP address, hostname or domain name,
registrant information, DNS records including country, city, state, phone and fax
numbers, network service providers, administrators and technical support information for
any IP address or domain name.
What information is gathered about the victim using email tracking tools?
Targeted contact data, extracts the URL and meta tag for website promotion
Username of the clients, operating systems, email addresses, and list of software
Explanation:
Email tracking monitors the emails of a particular user. This kind of tracking is possible
through digitally time stamped records that reveal the time and date when the target
receives and opens a specific email. Email tracking tools allows you to collect
information such as IP addresses, mail servers, and service provider involved in sending
the mail.
Information gathered about the victim using email tracking tools:
Which of the following tools allows an attacker to extract information such as sender
identity, mail server, sender’s IP address, location, and so on?
Explanation:
Email tracking monitors the emails of a particular user. This kind of tracking is possible
through digitally time stamped records that reveal the time and date when the target
receives and opens a specific email. Email tracking tools allows an attacker to collect
information such as IP addresses, mail servers, and service provider involved in sending
the mail.
Which of the following DNS record type helps in DNS footprinting to determine a
domain’s mail server?
MX
NS
CNAME
Explanation:
DNS footprinting, namely Domain Name System footprinting, reveals information about
DNS zone data. DNS zone data include DNS domain names, computer names, IP
addresses, and much more about a particular network. An attacker uses DNS information
to determine key hosts in the network, and then performs social engineering attacks to
gather even more information.
DNS footprinting helps in determining following records about the target DNS:
RP Responsible person
BeRoot
Sherlock
Sublist3r
OpUtils
Explanation:
Which of the following tools is a command-line search tool for Exploit-DB that allows
taking a copy of the Exploit database for remote use?
Spyse
DroidSniff
Spokeo
SearchSploit
Explanation:
Jacob, a professional hacker, targeted an organization’s website to find a way into its
network. To achieve his goal, he employed a footprinting tool that helped him in
gathering confidential files and other relevant information related to the target website
from public source-code repositories.
ShellPhish
Netcraft
Reverse Lookup
Recon-ng
Explanation:
Identify the online third-party repository targeted by Peter in the above scenario.
GitLab
Sublist3r
MITRE ATT&CK framework
BeRoot
Explanation:
Which of the following tools allows attackers to construct and analyze social networks
and obtain critical information about the target organization/users?
NodeXL
Mention
Burp Suite
Explanation:
NodeXL: Attackers use various tools such as Gephi, SocNetV, and NodeXL to
construct and analyze social networks and obtain critical information about the
target organization/users.
Mention: Mention is an online reputation tracking tool that helps attackers in
monitoring the web, social media, forums, and blogs to learn more about the
target brand and industry.
HTTrack Web Site Copier: HTTrack is an offline browser utility. It downloads a
website from the Internet to a local directory and recursively builds all the
directories including HTML, images, and other files from the web server on
another computer.
Burp Suite: Burp Suite is an integrated platform for performing security testing of
web applications. Its various tools work together to support the entire testing
process, from initial mapping and analysis of an application's attack surface to
finding and exploiting security vulnerabilities.
Which of the following commands allows attackers to retrieve the archived URLs of a
target website from archive.org?
cewl www.certifiedhacker.com
Explanation:
Which of the following tools allows attackers to retrieve archived URLs of a target
website from archive.org?
Burp Suite
Sublist3r
SecurityTrails
Photon
Explanation:
Which of the following tools does an attacker use to perform a query on the platforms
included in OSRFramework?
usufy.py
searchfy.py
mailfy.py
domainfy.py
Explanation:
The tools included in the OSRFramework package that attackers can use to gather information on the
target are listed below:
-d
-p
-e
-o
Explanation:
Sublist3r
Syntax:
sublist3r [-d DOMAIN] [-b BRUTEFORCE] [-p PORTS] [-v VERBOSE][-t THREADS]
[-e ENGINES] [-o OUTPUT]
Which of the following tools allows attackers to collect information such as subdomains,
IP addresses, HTTP response status, SSL/TTL certificates, vulnerability scores, and DNS
records of the target domain or website?
Nagios
Spyse
THC-Hydra
L0phtCrack
Explanation: