Bash, the Crucial Exams Chat Bot
AI Bot

Reconnaissance and Footprinting Methods Flashcards

CompTIA PenTest+ PT0-002 Flashcards

Study our Reconnaissance and Footprinting Methods flashcards for the CompTIA PenTest+ PT0-002 exam with 30+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
CompTIA PenTest+ PT0-002 Course Header Image
FrontBack
Define OSINTOpen Source Intelligence - information collected from publicly available sources such as websites, social media, public records, and publications
How can archived websites be useful in reconnaissance?They may contain sensitive information that has been removed from current versions but remains accessible through archives like the Wayback Machine
How can metadata in documents reveal sensitive information?May contain author names, organization details, software versions, creation dates, and other hidden information
How can social media be used in reconnaissance?To build profiles of individuals, understand organizational structure, track activities, and identify potential vulnerabilities
How does DNS interrogation help in reconnaissance?Reveals domain name information, mail servers, IP addresses, and potential internal network structure
How does Shodan differ from regular search engines?Shodan indexes internet-connected devices rather than websites, allowing discovery of exposed systems and services
Name three common OSINT frameworksMaltego, OSINT Framework, SpiderFoot
What are the main categories of DNS records useful in reconnaissance?A (address), MX (mail exchange), NS (name server), SOA (start of authority), TXT (text), CNAME (canonical name)
What information can be obtained from WHOIS lookups?Domain registrant information, contact details, registration dates, name servers, and registrar information
What information can LinkedIn provide during reconnaissance?Company structure, employee names, job titles, professional backgrounds, and potential internal technologies
What is a network topology map?Visual representation of how devices are connected on a network, showing the arrangement of nodes and their connections
What is active reconnaissance?Direct interaction with a target system to gather information; includes port scanning, DNS queries, and network mapping
What is DNS zone transfer?Process of copying DNS zone files from a primary DNS server to secondary servers; can reveal internal network structure if misconfigured
What is fingerprinting in the context of reconnaissance?Identifying the specific operating systems, services, or applications running on target systems
What is footprinting?Systematic method of gathering target information to create a profile of an organization's security posture
What is geolocation in reconnaissance?Identifying the physical location of target systems or infrastructure
What is Google dorking?Using advanced search operators in Google to find specific information or vulnerabilities in websites
What is harvesting email addresses?Collecting email addresses associated with a target organization to identify potential points of contact or targets for social engineering
What is horizontal scanning?Scanning multiple hosts for a specific port or service
What is Maltego used for?Visual link analysis for gathering and connecting information for reconnaissance investigations
What is meant by "the attack surface"?The sum of all points where an unauthorized user can attempt to enter or extract data from an environment
What is passive reconnaissance?Gathering information about a target without direct interaction; includes techniques like analyzing public records, social media, and search engine results
What is Recon-ng?A full-featured reconnaissance framework designed for web-based information gathering
What is social engineering in the context of reconnaissance?Manipulating people to divulge confidential information through pretexting, phishing, or impersonation
What is subdomain enumeration?Process of finding valid subdomains for a domain to expand the potential attack surface
What is the purpose of Banner Grabbing?Technique to obtain information about systems on a network by retrieving banners from services that display version information
What is the purpose of the traceroute command?Maps the route packets take from your computer to a destination, revealing network topology information
What is vertical scanning?Scanning a single host for multiple ports or services
What tool can create visual network maps from traceroute data?Zenmap (Nmap's GUI) or Visual Trace Route tools
What tool is commonly used for DNS enumeration?nslookup, dig, or host commands
Share on...
Follow us on...