Deck D Prt. 2 Flashcards
(25 cards)
Man In The Middle
In Order to mitigate, Man-In-The-Middle (MITM) Attack, Make sure that Legitimate Network Routers are Configured to run Routing Protocols with Authentication
Meet In The Middle Attack
Meet In the Middle Attack Is KNOWN Plaintext Attack Used Against DES Which Gives the Result that Encrypting Plaintext With ONE DES Key followed by Encrypting It with a Second DES Key is no more Secure THAN using a Single Key
Multi-Homed Firewall
The Minimum Number of Network Connections in a Multihomed Firewall is 3
NIDS
Is The (Network Intrusion Detection System) Best Applicable for Large Environments Where Critical Assets on the Network need Extra Scrutiny and is Ideal for Observing Sensitive Network Segments
Nmap -oX Flag
In an Nmap Scan the -oX flag outputs the results in XML format to a file
Nmap Command
nmap -sT -O -T0 is the Command that would Result in a Scan of Common Ports with the Least Amount of NOISE in Order to Evade IDS
Nmap Command
nmap -T4 -F 10.68.3.10/24 Command allows you to Enumerate all Machines in the IP Address of 10.68.3.10
OSINT
Is the Collection of Potentially Actionable, Overt, & Publicly Available Information
PCI Compliance
Is the Standard Set by the CREDIT CARD Companies. It does not Recommend Rotating Employees handling Credit Card Transactions on a yearly Basis to Different Departments
Penetration Test
A Penetration Test Actively Exploits Vulnerabilities in the Targeted Infrastructure, while a Vulnerability Scan Does Not Typically Involve Active Explication
Printer Ports
Port 515 Is where PRINTERS Listen for Connection, Port 631 is for the IPP i.e Internet Printing Protocol and port 9100 is used for Printing as well
RECON
Is the Time A Hacker Spends Performing Research to locate the Information about a Company
Risk Acceptance
Is a GOOD Strategy if the risk is only 10% and Risk Threshold is 20%
Rubber Hose Attack
A Rubber Hose Attack Allows Extraction of Cryptographic Secrets through coercion or torture such as beating that person with a rubber hose
Rules Of Engagement
The Rules Of Engagement Describe the specifics of the Penetration Testing, The Associated Violations, and Essentially protects both the Organization’s Interest and your liabilities as a Tester
STARTTLS
Is The Name of the Command USED by SMTP Transmit Email OVER TLS
ShellShock Bash Vulnerability
env x=’(){:;}echo explit’ bash ‘“c ‘~cat/etc/passwd’ is an example of Shellshock Bash Vulnerability in LINUX that will Display Passwd content to the Command Prompt.
Social Engineering
Is a Low Tech Way of Gaining Unauthorized Access to Systems
Tunneling/Stealth/Encrypted Virus
Tunnelling Virus is a Virus that Attempts to Intercept Anti-Virus Software before it can detect Malicious Code. A Tunneling Virus Launches itself under anti virus Programs and then works by going to the Operating System’s Interruption Handlers and intercepting them, Thus avoiding Detection. Tunneling Virus Hides from anti Virus Program’s by actively altering and corrupting the chosen service all Interruptions when they are being run.
Stealth Virus is a Very tricky Virus as it changes the code that can be Used to Detect it. Hence, the Detection of Viruses becomes very difficult. Encryption Virus Exists in encrypted form to avoid detection. it Carries a DECRYPTION Algorithm along with it. So the Virus First Decrypts and Then Executes.
Two Factor Authenticatoin
2FA is a Camera Capturing People Walking (GAIT-Something you Are) Combined with RFID Badges (Something You Have)
UDP Port 53
UDP Port 53 is DNS is not Available, and Therefor websites will no longer be Accesssible.
WHOIS
Is a system that consist of a PUBLICLY Available set of Databases that Contain Domain name Registration contact Informatoin
Whisker
Is the Tool Used to Perform Session Splicing Attacks. Sessions Splicing is an IDS Evasion Technique in Which an Attacker Delivers Data in multiple small Sized PACKETS to the Target Computer, making it very Difficult for and IDS to detect the Attack Signatures. Hydra is a Password
Whisker Tool
Is A EVASION TOOL for Session Splicing. One Basic Technique is to split the Attack Payload into Multiple Small Packets so that the IDS Must Reassemble the Packet Stream to Detect the Attack. A Simple Way of Splitting Packets is by Fragmenting them. The “Whisker” Evasion TOOL calls Crafting Packets with small Payloads ‘Session Splicing’