Chapter 5 - 8 Flashcards

(54 cards)

1
Q

SAM Files

A

Security Accounts Manager File - Windows store credential in SAMs File. C:\windows\system32\config v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LM Authentication

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NTLM

A

DES and MD4 (V2 MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WINDOWS registry

A

is a collection of all the setting and configurations that make the system run - made up of keys and values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacking Steps

A

Reconnaissance, Scanning , Gaining Access, Maintaining Access, Clearing Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Net view /domain:domainname

A

Show all systems on a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

net view \systemname

A

provide a list of open shares on the system named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

net use \target\ipc$ “” /u: ‘’

A

set up a null sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive online attack

A

Sniffing a wire in the hopes of either intercepting a password in clear text or replay attack or a man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vertical Escalation

A

When a lower level user executes code at a high privilege level than they should have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Horizontal Escalation

A

Excuting code at the same user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos

A

Uses both Symmetric and Asymmetric encryption. technologies to securely transmit passwords and keys across a network. (TGT TGS AS KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Important Keys

A

HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\RunServiceOnce ( RunServices RunOnce Run)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack types

A

Non- Electronic, Active Online, Passive online , Offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLL Hijacking

A

Replacing legitimate DLL with malicious copies in the application root folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

New Technology File System

A

NTFS file streaming allows you to hide files virtually behind any other file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of Logs

A

Application, Security, Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rootkit

A

Collection of software put in place by an attacker that is designed to obscure system compromise (backdoor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Type of Rootkits

A

Hypervisor Level, Hardware, Boot loader level, application Level, Kernel Level and Library Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IETF

A

Internet Engineering Task Force - Create engineering documents to help improve the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

W3C

A

World Wide Web Consortium - International Community working together to develop web standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OWASP

A

Open Web Application Security Project - Focused on improve the security of software

23
Q

Apache configuration

24
Q

IIS configuration

A

Spawns shells as LOCAL_SYSTEM

25
N-tier architecture
Distributes processes across multiple servers - Each tier consists of a single role carried out by one
26
Three Tier Architecture
Presentation Tier, Logic Tier and Data Tier
27
HTML entity
Way of telling the browser to display certain character it would otherwise look at as a tag or part of the programming itself   and
28
HTTP request methods
GET, HEAD, POST, PUT, DELETE,TRACE and CONNECT§
29
DNS Amplification
Attack manipulating recursive DNS to DoS a target
30
Web 2.0
Different method of creating website and applications (dynamic web pages) web 1.0 using static HTML
31
LDAP Injection
)(&) after username then any password
32
SOAP Injection
Inject malicious queries
33
Buffer Overflow
Also known as Smashing the stack is an attempt to write more data into an application prebuilt buffer to overwrite adjacent memory, execute code or crash a system
34
CSRF
Cross Site Request Forgery - Get user to execute unwanted actions on a web application on which they are currently authenticated
35
HTTP Response Splitting
Adding header response data to an input field so the server splits the response in a couple directions - second header can be controlled and used for malicious reasons
36
802.11i
WLAN
37
802.16
Global development of broadband wireless metropolitan area network
38
modulation
the practice of manipulating properties of a waveform
39
OFDM Wavelength
Orthogonal Frequency-Division Multiplexing - Works with several waveforms, simultaneously carrying messages back and forth
40
DSS
Direct-sequence spread spectrum - combing all wavelengths into a single purpose
41
Ad hoc mode
Wireless systems connect directly to other systems as if a cable were strung between the two
42
Infrastructure mode
Uses an access point (AP) to funnel all wireless connections through
43
BSS (Basic Service Area)
Single AP and its client is known as a basic service sent
44
ESS
As client move from one AP in your subnet to another - dissociated with one AP and (re)associate with another seamlessly
45
Omnidirectional Antenna
360 degrees from sourse
46
Directional Antenna
Focusses in a specific direction
47
Dipole
Two signal towers and work omnidirectional
48
SSID
Service set identifier - text word (32 characters or less) that distinguishes wireless networks (part of the header in every packet)
49
WEP
Wireless equivalent privacy - 40 bits to 232-bit keys in RC4 encryption algorithm - reuses initialisation vectors
50
WPA
Wifi Protected Access (WPA or WPA2) - Uses TKIP 128 - bit key - changes key every 10000 packets
51
WPA2
Can tie Extensible Authentication Protocol (EAP) - Uses AES for encryption
52
Untethered
Kernel will remain patched
53
Semi-tethered
Reboot no longer trains the patched kernel but the software has already been added to the device, there for if admin privileges are required the installed jail breaking tool can be used)
54
tethered
Reboot removes all jailbreaking patched and the phone may be stuck in a perpetual loop on start up, requiring a system connection, such as a usb to repair)