Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 1 Question 67 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 67
Topic #: 1
[All GSNA Questions]

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D, E

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1.Information gathering

2.Determining network range

3.Identifying active machines

4.Finding open ports and applications

5.OS fingerprinting

6.Fingerprinting services

7.Mapping the network

Answer C is incorrect. In the enumeration phase, the attacker gathers information such as the network

user and group names, routing

tables, and Simple Network Management Protocol (SNMP) data. The techniques used in this phase are as follows:

1.Obtaining Active Directory information and identifying vulnerable user accounts

2.Discovering NetBIOS names

3.Employing Windows DNS queries

4.Establishing NULL sessions and queries


Contribute your Thoughts:

Javier
18 days ago
Finding open ports and applications? Might as well roll out the welcome mat for John!
upvoted 0 times
Lynna
3 days ago
User 1
upvoted 0 times
...
...
Martin
20 days ago
Enumeration, huh? Sounds like John's gonna be a regular Sherlock Holmes on this one.
upvoted 0 times
...
Theola
23 days ago
Information gathering is key - can't just go in blind, gotta know what you're up against.
upvoted 0 times
...
Maybelle
1 months ago
Definitely need to do some recon before the actual attack. Gotta identify those active machines and open ports first!
upvoted 0 times
Dona
15 days ago
User3: Don't forget about finding open ports and applications during the pre-attack phase.
upvoted 0 times
...
Gracia
17 days ago
User2: Yes, and he also needs to identify the active machines on the server.
upvoted 0 times
...
Iluminada
19 days ago
User1: John should definitely start by determining the network range.
upvoted 0 times
...
...
Nobuko
1 months ago
Identifying active machines and finding open ports and applications are also important in the pre-attack phase.
upvoted 0 times
...
Aliza
1 months ago
I think John will also determine the network range.
upvoted 0 times
...
Haydee
1 months ago
John will perform information gathering in the pre-attack phase.
upvoted 0 times
...

Save Cancel