Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 1 Question 67 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 67
Topic #: 1
[All GSNA Questions]

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D, E

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1.Information gathering

2.Determining network range

3.Identifying active machines

4.Finding open ports and applications

5.OS fingerprinting

6.Fingerprinting services

7.Mapping the network

Answer C is incorrect. In the enumeration phase, the attacker gathers information such as the network

user and group names, routing

tables, and Simple Network Management Protocol (SNMP) data. The techniques used in this phase are as follows:

1.Obtaining Active Directory information and identifying vulnerable user accounts

2.Discovering NetBIOS names

3.Employing Windows DNS queries

4.Establishing NULL sessions and queries


Contribute your Thoughts:

Javier
6 days ago
Finding open ports and applications? Might as well roll out the welcome mat for John!
upvoted 0 times
...
Martin
8 days ago
Enumeration, huh? Sounds like John's gonna be a regular Sherlock Holmes on this one.
upvoted 0 times
...
Theola
11 days ago
Information gathering is key - can't just go in blind, gotta know what you're up against.
upvoted 0 times
...
Maybelle
20 days ago
Definitely need to do some recon before the actual attack. Gotta identify those active machines and open ports first!
upvoted 0 times
Dona
3 days ago
User3: Don't forget about finding open ports and applications during the pre-attack phase.
upvoted 0 times
...
Gracia
5 days ago
User2: Yes, and he also needs to identify the active machines on the server.
upvoted 0 times
...
Iluminada
7 days ago
User1: John should definitely start by determining the network range.
upvoted 0 times
...
...
Nobuko
21 days ago
Identifying active machines and finding open ports and applications are also important in the pre-attack phase.
upvoted 0 times
...
Aliza
25 days ago
I think John will also determine the network range.
upvoted 0 times
...
Haydee
1 months ago
John will perform information gathering in the pre-attack phase.
upvoted 0 times
...

Save Cancel