IA - Ethical Hacking Flashcards

(65 cards)

1
Q

is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

identification and assurance of the origin of information.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the concealment of information or resources

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to the ability to use the information or resource desired

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

person who enjoys learning the details of computer systems and stretch their capabilities.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to a person who uses his hacking skills for offensive purposes.

A

cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to security professionals who apply their hacking skills for defensive purposes

A

ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • An action or event that might prejudice security
  • potential violation of security
A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An IT system, product, or component that is identified/subjected as requiring security evaluation.

A

Target of Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • An assault on system security that derives from an intelligent threat.
  • any action that violates security.
A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A defined way to breach the security of an IT system through vulnerability.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

can be defined as a legal and authorized attempt to locate and successfully exploit computer systems for the purpose of making those systems more secure.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • The process includes probing for vulnerabilities as well as providing proof of concept attacks to demonstrate the vulnerabilities are real.
  • testing always ends with specific recommendations for addressing and fixing the issues that were discovered during the test.
  • find security issues by using the same tools and techniques as an attacker. These findings can then be mitigated before a real hacker exploits them.
A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration testing is also known as

A
  1. pen testing
  2. pt
  3. ethical hacking’
  4. hacking
  5. white hat hacking
  6. offensive security
  7. red teaming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The first and simplest way to differentiate between white hats and black hats is

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The second way to differentiate between an ethical hacker and a malicious hacker is through examination of the attacker’s

A

motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

to provide the organization a realistic attack simulation so that the company can improve its security through early discovery and mitigation of vulnerabilities, the attacker should be considered a white hat.

A

intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Differentiate Ethical from Malicious Hacker?

A
  1. authorization
  2. motivation
  3. intent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What Does a Malicious Hacker Do

A

1.recoinnaissance
2.scanning
3. gaining access
4. maintaining access
5. covering tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.

A

scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
* refers to the **true attack phase.** * The **hacker exploits the system.**
gaining access
24
* refers to the phase when the **hacker tries to retain his ‘ownership**’ of the system. * The hacker has **exploited a vulnerability and can tamper and compromise** the system.
maintaining access
25
* refers to the activities undertaken by the **hacker to extend his misuse of the system** without being detected. * Reasons include need for **prolonged stay, continued use of resources,** removing evidence of hacking, avoiding legal action etc. * Hackers can **remain undetected for long periods** or use this phase to start a fresh reconnaissance
Covering Tracks
26
* Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as ‘Crackers.’ * Reformed crackers First-hand experience Lesser credibility perceived
Black hats
27
* Individuals professing hacker skills and using them for defensive purposes. Also known as ‘Security Analysts’. * Independent security consultants (maybe groups as well) Claims to be knowledgeable about black hat activities
White Hats
28
* Individuals who work both offensively and defensively * Part of ICT firms Good credentials
gray hats
29
* **hacking with / for a cause’.** * Comprises of hackers with a social or political agenda * Aims at **sending across a message through their hacking activity** and gaining visibility for their cause and themselves.
hacktivism
30
Ethical hackers tries to answer
* What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking) * What can an intruder do with that information? (Gaining Access and Maintaining Access phases) * Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)
31
Skill Profile of an Ethical Hacker
1. Computer expert adept at technical domains. 2. In-depth knowledge about target platforms (such as windows, Unix, Linux). 3. Exemplary knowledge in networking and related hardware / software. 4. Knowledgeable about security areas and related issues – though not necessarily a security professional.
32
There are five e-Business certification tracks under EC-Council Accreditation body:
1. Certified e-Business Associate 2. Certified e-Business Professional 3. Certified e-Business Consultant 4. E++ Certified Technical Consultant 5. Certified Ethical Hacker
33
Any security evaluation involves three components
1. preparation 2. conduct 3. conclude
34
In this phase, the **evaluation technical report is prepared** based on testing potential vulnerabilities.
Conduct
35
In this phase, a **formal contract is signed that contains a non-disclosure** clause as well as a legal clause to protect the ethical hacker against any prosecution that he may attract during the conduct phase. The contract also outlines infrastructure perimeter, evaluation activities, time schedules and resources available to him.
Preparation
36
In this phase, the results of the evaluation is communicated to the organization / sponsors and corrective advise / action is taken if needed.
Conclusion
37
Modes of Ethical Hacking
1. Remote network 2. Remote dial-up network 3. Local network 4. Stolen equipment 5. Social engineering 6. Physical entry
38
This mode attempts to **simulate an intruder launch an attack over the Internet.**
Remote network
39
This mode attempts to **simulate an intruder launching an attack against the client’s modem pools.**
Remote dial-up network
40
This mode **simulates an employee with legal access gaining unauthorized access** over the local network.
Local network
41
This mode **simulates theft of a critical information** resource such as a **laptop owned by a strategist,** (taken by the client unaware of its owner and given to the ethical hacker).
Stolen equipment
42
This aspect attempts to check the integrity of the organization’s employees
Social engineering
43
This mode attempts to physically compromise the organization of ICT infrastructure
Physical entry
43
Security testing can be conducted using one of two approaches
1. black box 2. white box
44
with no prior knowledge of the infrastructure to be tested
Black-box
45
with a complete knowledge of the network infrastructure
White-box
46
is **also known as Gray-box testing** and this examines the extent of access by insiders within the network
Internal Testing
47
Deliverables
1. Ethical Hacking Report 2. Details the results of the hacking activity 3. Vulnerabilities are detailed and avoidance measures suggestedIssues to consider
48
* the **blueprinting of the security profile of an organization, undertaken in a methodological manner.** * one of the three pre-attack phases. The others are scanning and enumeration. * results in a unique organization profile with respect to networks
Footprinting
49
* is a program to query **Internet domain name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure** * Helps **find additional IP addresses** if authoritative DNS is known from whois * MX record reveals the IP of the mail server
Nslookup
49
* works by **exploiting a feature of the Internet Protocol called TTL,** or Time To Live * reveals the **path IP packets** travel between two systems by sending out consecutive UDP packets with ever-increasing **TTLs**
Traceroute
50
Information Gathering Methodology
1. Unearth initial information 1. Locate the network range 1. Ascertain active machines 1. Discover open ports / access points 1. Detect operating systems 1. Uncover services on ports 1. Map the Network
51
Unearthing Initial Information: Commonly includes
1. Domain name lookup 1. Locations 1. Contacts
52
Unearthing Initial Information: Information Sources
Open source Whois Nslookup Hacking Tool: Sam Spade
53
Locate the Network Range
**Commonly includes:** 1. Finding the range of IP addresses 1. Discerning the subnet mask **Information Sources:** 1. ARIN (American Registry of Internet Numbers) 1. Traceroute **Hacking Tool:** 1. NeoTrace 1. Visual Route
54
* allows search on the who is **database to locate information on networks autonomous system numbers (ASNs),** network-related handles and other related point of contact (POC). * whois allows querying the IP address to help find information on the strategy used for subnet addressing.
ARIN
55
* useful **network information utility that allows you to find out all available information about an IP address, host name, or domain, including country, state or province, city,** name of the network provider, administrator and technical support contact information * can find the information about a computer located in any part of the world
SmartWhois
55
provides **high level views** as well as detailed and historical views that provide traffic information in real-time or on a historical basis.
VisualLookout
55
**e-mail analysis tool** that enables analysis of an e-mail and its headers automatically and provides graphical results
eMailTrackerPro
56
is a tracking service that allows the user to **track when his mail was read,** for how long and how many times
Mail Tracking
56
can reveal public information of a domain that can be leveraged further
Whois, ARIN
57
can be used to **target specific IP and later for IP spoofing.**
Traceroute and mail tracking
58
can reveal specific users and zone transfers can compromise **DNS security**
Nslookup