Common Terms Flashcards

1
Q

Hack Value

A

A term of describing how willing a hacker would be to invest their time/energy to crack a system, file, etc. and whether or not it’d be worth attempting.
(a file containing absolutely atrocious amounts of porn (low hack value/not hack value (probably; depending on the perpetrator) vs. a file containing someone’s passport and credit card information (high hack value/hack value)).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

A weakness that could compromise a system (system: not just referring to a computer system, but any system. Corporation, household, government, etc.) and could be used as a possible means of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit

A

A piece of code that takes advantage of a vulnerability to deliver malicious code.
Can also be defined as any way to take advantage of a vulnerability to attack a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Payload

A

A malicious piece of code delivered through an exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

R.A.T.

A

Remote Access Trojan
A program used by an intruder to take control of a victim’s computer remotely, giving them access to the computer’s files, allowing covert surveillance and a backdoor for administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NSP

A

Network Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash

A

a hash is a function that converts one value to another.

Example:

keys-v/hash function-v/hash-v
John Smith ----\   [/---- ]-- 00
Chad Hecks ---/ \[/---- ]--  01
Dirk McFunkle -/ [\      ]   02
                             [  \---]-- 03
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Threat

A

A security - threat - is anything that has a potential of causing damage to a system/network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Attack

A

A security -attack - is an attempt to gain unauthorized access to a system/network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack Vector

A

An attack vector is a means by which a hacker delivers a payload to a system/network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DOS

A

Disk Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CPU

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GPU

A

Graphics Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The “IP” in IP address

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SQL

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Array

A

An array is a data structure, which can store a fixed-size collection of elements of the same data type. An array is used to store a collection of data, but it is often more useful to think of an array as a collection of variables of the same type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PCI DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SOX

A

Sarbanes Oxley Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DMCA

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

WIPO

A

World Intellectual Property Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

FISMA

A

Federal Information Security Management Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Nonrepudiation

A

Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. To repudiate means to deny.

32
Q

NDA

A

Non-disclosure Agreement

33
Q

VPN

A

Virtual Private Network

34
Q

Risk

A

Refers to the threat of damage or loss

35
Q

RAID

A

Redundant array of inexpensive(/independent) disks

RAID works by placing data on multiple disks and allowing input/output (I/O) operations to overlap in a balanced way, improving performance.

36
Q

OS

A

Operating System

37
Q

ROSI

A

Return Of Security Investment

38
Q

ICMP

A

ICMP (Internet Control Message Protocol) is an error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.

39
Q

Dictionary Attack

A

A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password. … Dictionary attacks work because many computer users and businesses insist on using ordinary words as passwords.

40
Q

ACE

A

In computer security, arbitrary code execution (ACE) is used to describe an attacker’s ability to execute arbitrary commands or code on a target machine or in a target process. … A program that is designed to exploit such a vulnerability is called an arbitrary code execution exploit.

41
Q

Buffer Overflow Attack:

A

Attackers exploit buffer overflow issues by overwriting the memory of an application. This changes the execution path of the program, triggering a response that damages files or exposes private information.

42
Q

The Difference Between DoS and DDos Attacks:

A

The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets.

43
Q

Trojan:

A

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

44
Q

Registry

A

The registry or Windows registry is a database of information, settings, options, and other values for software and hardware installed on all versions of Microsoft Windows operating systems. When a program is installed, a new subkey is created in the registry. This subkey contains settings specific to that program, such as its location, version, and primary executable.

45
Q

Rootkit

A

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

46
Q

Spyware

A

software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive (most often without the user’s consent),

47
Q

Keylogger

A

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keylogger can be either software or hardware.

While the programs themselves are legal,[1] with many of them being designed to allow employers to oversee the use of their computers, keyloggers are frequently used for stealing passwords and other confidential information.

48
Q

Security Audit:

A

Inspects if an organization is following security standards and policies.

49
Q

Vulnerability assessment:

A

Deals (only) with finding the vulnerabilities of a network.

50
Q

Penetration Testing:

A

Encompasses both security audit and vulnerability assessment. It also demonstrates how attackers can exploit the identified vulnerabilities.

51
Q

Blue team (red team vs. blue team):

A

Blue team is defender team and its role is to detect attackers and predict possible attacks.

52
Q

Red team (red team vs. blue team):

A

Red team is the attacker team and its role is to find vulnerabilities in the system and check the security as real attackers would.

53
Q

White box testing:

A

The penetration testers are given complete information about the client’s infrastructure.

(think “light vs. dark”. White = lots of information i.e. brighter/more visibility. Black = practically no information i.e. in the dark)

54
Q

Black box testing:

A

The penetration testers are given very little information about the client’s infrastructure.

(think “light vs. dark”. White = lots of information i.e. brighter/more visibility. Black = practically no information i.e. in the dark)

55
Q

Grey box testing:

A

This type of testing uses a combination of black box and white box testing and gives a full inspection of the system, simulating both outside and inside attacks.

56
Q

Pre-attack phase:

A

The pre-attack phase mainly includes activities such as preparation and planning, and information gathering. The objective is to gather as much information about the target as possible.

57
Q

Attack phase:

A

This is the phase where you compromise the target and exploit the vulnerabilities you’ve uncovered in the pre-attack phase using the information you’ve previously gathered.

58
Q

Post-attack phase:

A

In this phase, the tester restores the system to the pretest state (the state the system was in prior to the penetration).
The tester then reports all flaws and vulnerabilities of the system that they’ve uncovered.
All activities and results must be thoroughly documented.

59
Q

Steps to take when performing an attack:

A
  1. Penetrate perimeter
  2. Acquire target
  3. Escalate privileges
  4. Execute, implant, and retract
60
Q

Evaluating IDS and protocol filter rules // Checking access controls:

A

Techniques used to bypass IDS and firewalls.

61
Q

Reverse shell

A

A reverse shell is a shell initiated from the target host back to the attack box which is in a listening state to pick up the shell.

To gain control over a compromised system, an attacker usually aims to gain interactive shell access for arbitrary command execution. With such access, they can try to elevate their privileges to obtain full control of the operating system. However, most systems are behind firewalls and direct remote shell connections are impossible. One of the methods used to circumvent this limitation is a reverse shell.

62
Q

In which activity do ICMP probes, checking access controls, evaluating protocol filtering rules, and evaluating IDS take place ?

A

Bypassing firewall.

63
Q

Target acquisition:

A

Target acquisition involves vulnerability scans to find vulnerabilities which can be later exploited.

64
Q

Perimeter penetration:

A

Perimeter penetration is an activity in which a pen tester uses social engineering to test out the boundaries and find a way into the system.

65
Q

Footprinting:

A

The act of gathering information from and about a selected target.

66
Q

fedora:

A

fedora is a Linux based operating system which is a spin-off of red hat, used as a testing ground for new technologies which are later applied in red hat.

67
Q

“site:” means what in the Google browser ?

A

States that Google should search only within the confines of whichever domain follows “site:”. Ex: site:linuxacademy.com

68
Q

“intext:” means what in the Google browser ?

A

States that Google should search in the text of the website.

69
Q

When you place a term within quotation marks in the Google browser, what does the browser do ?

A

The Google browser searches only for sites that include that full term, and exactly that term (no modifications at all).
Ex: “please change your” will search only for websites that include the term “please change your”.

70
Q

”|” means what in the Google browser ?

A

It means “or”, essentially.

Ex: searching “sapien | ape” will search for all websites containing either “sapien” OR “ape”.

71
Q

”-“ means what in the Google browser ?

A

States that whatever follows “-“ will be excluded from search results.
Ex: searching “my pungent asshole -presence -of -god” will search for “my pungent asshole” and exclude any results including any presence of God.

72
Q

“file:” means what in the Google browser ?

A

Specifies the type of file that should be searched for.

Ex: searching “lack of human decency file:pdf” will search for any pdf files displaying a lack of basic human decency.

73
Q

Shodan

A

If you search a domain in Shodan, you might come across some good data (but Ermin doesn’t seem to approve) - IP’s in use, type of web server, what’s being hosted, what versions are being hosted, and which technologies are in use. “Keep in mind that these things can be fairly inaccurate”
- Ermin the all-knowing (not said with sass).
It’s usually going to be a better idea to conduct your own search with your own methods in order to get more consistent, reliable results.

Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. … It was launched in 2009 by computer programmer John Matherly, who, in 2003, conceived the idea of searching devices linked to the Internet.

74
Q

Netcraft

A

Netcraft is a provider of cybercrime disruption services across a range of industries. In November 2016, Philip Hammond, Chancellor of the Exchequer, announced plans for the UK government to work with Netcraft to develop better automatic defences to reduce the impact of cyber-attacks affecting the UK.

75
Q

Cloudflare

A

Companies might hide their web servers and web services (and other services) behind Cloudflare so that you only ever know the domain and never the actual IP address.

  • useful for DDoS protection, prevention of direct access, hiding the geographic location of company/servers.
  • you’ll see the IP address of Cloudflare, but not the company’s actual IP address being Cloudflare
76
Q

DNS server (aka nameserver):

A

A DNS server is a computer server that contains a database of public IP addresses and their associated hostnames, and in most cases serves to resolve, or translate, those names to IP addresses as requested. DNS servers run special software and communicate with each other using special protocols.