Common Attack Techniques Flashcards

1
Q

Cross Compiling Code

A
  • compiling on linux for windows using tools like mingw-w64
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit Modification

A
  • may need to modify exploits to get past organization security
  • encrypting or decoding an exploit to avoid detection by antivirus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proof of Concept Development

A
  • new or custom exploits require testing before using in pentest
  • build a virtual machine based on specifications you earned during enumeration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering

A
  • involves manipulating people to get information or to gain access, often uses deception and lies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Credential Brute Forcing

A
  • attempt to crack password or authentication system to gain access, cracking passwords from hash file, password guessing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dictionary Attack

A
  • brute force attack that uses dictionary of commonly used usernames and passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rainbow Tables

A
  • pre computed hash values of known usernames and passwords used for offline password file cracking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly