PrepAway - Latest Free Exam Questions & Answers

Which of the following tools can you use to accomplish the task?

John works as a professional Ethical Hacker. He is assigned a project to test the security of
www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now,
you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of
the following tools can you use to accomplish the task?

PrepAway - Latest Free Exam Questions & Answers

A.
Superscan

B.
NBTscan

C.
Nmap

D.
P0f

Explanation:
According to the scenario, you have searched all open ports of the we-are-secure
server. Now you want to perform the next information-gathering step, i.e., passive OS
fingerprinting. For this, you will use the P0f tool to accomplish the task. P0f is a passive OS
fingerprinting tool that is used to identify the operating system of a target host simply by examining
captured packets even when the device is behind a packet firewall. It does not generate any
additional direct or indirect network traffic. P0f can also be used to gather various information,
such as firewall presence, NAT use (for policy enforcement), existence of a load balancer setup,
active OS fingerprinting. Nmap is a free open-source utility for network exploration and security
auditing. It is used to discover computers and services on a computer network, thus creating a
“map” of the network. Just like many simple port scanners, Nmap is capable of discovering
passive services. In addition, Nmap may be able to determine various details about the remote
computers. These include operating system, device type, uptime, software product used to run a
service, exact version number of that product, presence of some firewall techniques and, on a
local area network, even vendor of the remote network card. Nmap runs on Linux, Microsoft
ping sweeper and hostname resolver. It can ping a given range of IP addresses and resolve the
host name of the remote system.The features of SuperScan are as follows: It scans any port
range from a built-in list or any given range. It performs ping scans and port scans using any IP
range. It modifies the port list and port descriptions using the built in editor. It connects to any
discovered open port using user-specified “helper” applications. It has the transmission speed
control utility.
information. It sends a NetBIOS status query to each address in a supplied range and lists
received information in human readable form. It displays IP address, NetBIOS computer name,
logged-in user name and MAC address of each responded host. NBTscan works in the same
manner as nbtstat, but it operates on a range of addresses instead of just one.


Leave a Reply