Answers

Chapter 1

  1. OSINT can involve both purely passive information-gathering and the use of the target’s public resources, which is not strictly passive in nature.
  2. The likelihood of a compromise and the impact of a compromise.
  3. Transform.
  4. Shannon’s maxim.
  5. False. Banner grabbing can inform the next stages of the engagement, saving the attacker time.

Chapter 2

  1. apd stands for access point daemon.
  2. Grep for “supported interface modes” from the iw list command.
  3. It tells the access point to ignore probe request frames that don’t specify the SSID of the network.
  4. Zero network.
  5. You must enable IP forwarding before starting the attack.
  6. The Organizationally Unique Identifier and the Network Interface Controller.
  7. False. The TCP/IP headers are not included ...

Get Windows and Linux Penetration Testing from Scratch - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.