Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 1 Question 67 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 67
Topic #: 1
[All GSNA Questions]

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D, E

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1.Information gathering

2.Determining network range

3.Identifying active machines

4.Finding open ports and applications

5.OS fingerprinting

6.Fingerprinting services

7.Mapping the network

Answer C is incorrect. In the enumeration phase, the attacker gathers information such as the network

user and group names, routing

tables, and Simple Network Management Protocol (SNMP) data. The techniques used in this phase are as follows:

1.Obtaining Active Directory information and identifying vulnerable user accounts

2.Discovering NetBIOS names

3.Employing Windows DNS queries

4.Establishing NULL sessions and queries


Contribute your Thoughts:

Javier
3 months ago
Finding open ports and applications? Might as well roll out the welcome mat for John!
upvoted 0 times
Pete
2 months ago
User 1
upvoted 0 times
...
Leonard
2 months ago
User 2
upvoted 0 times
...
Lynna
2 months ago
User 1
upvoted 0 times
...
...
Martin
3 months ago
Enumeration, huh? Sounds like John's gonna be a regular Sherlock Holmes on this one.
upvoted 0 times
...
Theola
3 months ago
Information gathering is key - can't just go in blind, gotta know what you're up against.
upvoted 0 times
Joaquin
2 months ago
Agreed, finding open ports and applications is also important.
upvoted 0 times
...
Asha
2 months ago
Yes, knowing the network range and active machines is essential.
upvoted 0 times
...
Mirta
2 months ago
Absolutely, information gathering is crucial before any attack.
upvoted 0 times
...
Rozella
2 months ago
E) Information gathering
upvoted 0 times
...
Erick
2 months ago
D) Finding open ports and applications
upvoted 0 times
...
Kina
2 months ago
C) Enumeration
upvoted 0 times
...
Melina
2 months ago
B) Identifying active machines
upvoted 0 times
...
Iraida
2 months ago
A) Determining network range
upvoted 0 times
...
...
Maybelle
3 months ago
Definitely need to do some recon before the actual attack. Gotta identify those active machines and open ports first!
upvoted 0 times
Dona
3 months ago
User3: Don't forget about finding open ports and applications during the pre-attack phase.
upvoted 0 times
...
Gracia
3 months ago
User2: Yes, and he also needs to identify the active machines on the server.
upvoted 0 times
...
Iluminada
3 months ago
User1: John should definitely start by determining the network range.
upvoted 0 times
...
...
Nobuko
3 months ago
Identifying active machines and finding open ports and applications are also important in the pre-attack phase.
upvoted 0 times
...
Aliza
3 months ago
I think John will also determine the network range.
upvoted 0 times
...
Haydee
4 months ago
John will perform information gathering in the pre-attack phase.
upvoted 0 times
...

Save Cancel