Ethical Hacking Flashcards

1
Q

Malware

A

Any malicious software. Created to inflict damage, steal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malicious software that needs user to execute it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that spreads copies of itself from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Encrypts system data and hacker requests cryptocurrency to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan Horse

A

Malicious software that often arrives via email or is pushed to users when
they visit an infected website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

Combination of the words robot and network. Refers to computers on a private network that were infiltrated with malicious software that the attacker uses for nefarious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common Attack Flow

A

Reconnaissance (scan for vulnerabilities)
Weaponization (Generate payload - Deliver)
Exploit and Execute (Run command upon execution)
Command and Control (possible full system access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Scanning

A

Reconnaissance step for mapping the network structure. Identify devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nmap

A

Network mapper/scanning tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fingerprinting

A

Detect services using nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewall & IDS Evasion

A

Proxies, Timing (-T flag), Fragmentation (-f flag), Decoys (-D flag)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Netdiscover

A

Uses ARP…networks without DHCP. Sniffs ARP replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Masscan

A

Performs large scale scans on thousands of IPs in seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zenmap

A

Nmap GUI version. Enables creation of customized profile scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On-Path Attack

A

Man-in-the-Middle Attacks: Eavesdropping on communication
Used to obtain info secretly
Allows control over network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP Poisoning

A

ARP resolves IP addresses to MAC addresses
Layer 2 protocol on LAN
Exploits lack of ARP packet validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Arpspoof

A

Tool used for ARP poisoning attack
Forged packet is sent to numerous times on the network
The victim ARP table is updated with the false entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS Poisoning Process

A

Use ARP poisoning to position the machine in the middle
Configure host file
Capture victim’s DNS request
Redirect the victim to a target IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bettercap

A

Tool for On-Path attacks
Can initiate ARP poisoning and DNS spoofing
Sends false DNS responses to the victim

20
Q

Port Stealing

A

Populating the forwarding table
Uses victim’s MAC address
Works only on LANs

21
Q

SSL Stripping

A

Downgrades HTTPS to HTTP
Provides plain text view of the data

22
Q

John

A

Linux tool for password cracking

23
Q

Crunch

A

Password list generator that forms passwords based on length and charsets
Useful when partial knowledge of the victim has been obtained
Can be used to generate lists of passwords according to templates

24
Q

Cupp

A

Creates a wordlist based on word victims may use
Social engineering on the victim may help the attacker build the list
Victim may use an easy to remember password based on personal information

25
Munge
Crates a modified wordlist based on Munge Level Using a predefined wordlist, Munge helps that attacker build a 1337 list of passwords
26
Hydra
Tool/login cracker that supports many remote protocols It continuously attacks while the server sends and access denied response -l [user name], -P [path to wordlist],
27
Ncrack
Fastest and most reliable tool for remote authentication Has built-in support for Nmap output formats and other advantages
28
SE
Social Engineering Based on human interaction and behavior Involves the use of psychological manipulation
29
SE Process
Preparation, Deceive to Connect, Winning Information, Cover the Tracks
30
Self-Extracting Archive
Fake executable documents can be created using a WinRAR feature called SFX
31
SFX Flow
Preparation, Icon Change, Create SFX, Hide Modules, Modify File Name
32
MetaSploit
Vulnerability, Payload, Exploit
33
Net.exe Utility
Windows software component...done in cmd Manages users, groups, and services Can also manage network connections
34
Flow of PE via WinLogon
OS: choose suitable OS Mount: mount live OS Edit: Override ethc.exe with cmd.exe CMD: Execute cmd.exe with high-level privileges PE: Add user, change a password
35
Offline Mitigations of Windows PE
BIOS Password Encrypt the Drive Physical Access
36
Online Mitigation of Windows PE
Principle of Least Privilege, Removing Local Admin Rights, Account Audits, User Account Controls, Applocker, Software, Code, Tokens
37
Burp Suite
Software tool used for pen testing web apps
38
Fiddler
Web debugging proxy that enables HTTP traffic examination for development
39
OWASP Zap
Combined Zap's pen testing project with OWASP projects for a complete solution
40
JavaScript
JS code can be added to HTML pages. Can affect the page's behavior.
41
XSS
Cross Site Scripting-client side Affects other users by storing code. Exploits vulnerability in web app.
42
Cookies
String of letters or numbers that verify, track, and store user information. XSS attack can acquire a cookie to steal a session.
43
LFI
Local File Inclusion Common in PHP-based websites. Uses the include() function
44
RFI
Remote File Inclusion. Accesses remote servers to deliver files
45
Vulnerability Assessments
Manual Scans-performed by PT experts to find complicated vulnerabilities Automated Scans- performed to locate simple and more obvious bugs