module 1 Flashcards
(32 cards)
What are the regulations in Ethical Hacking ?
- use information learned only for educational purposes.
- never use tools for malicious purposes or for fun.
- do not misuse the information for gaining unauthorized access.
- inform loophole
What are the basic terminology of hacking ?
- Vulnerability
- Threat
- Intrusion
- Breach
What is vulnerability?
Weakness in the network and/or its protocol.
What is threat?
Set of circumstances that has the potential to cause harm.
What is intrusion?
Any act or event that compromises the information on a network.
What is breach?
Breakdown of security of the network.
What is white hat hacker?
- ethical hacker
- non-malicious reasons
- clear code of ethics
- work together to improve security
What is black hat hacker?
- get information without authorization
- for crime purposes
What is grey hat hacker?
- ambiguous ethics borderline.
What are the 5 generic intrusion types?
- interruption
- interception
- modification
- fabrication
- invasion
What is interruption?
- making access to a resource become unavailable
DOS attack.
What is interception?
- Gaining unauthorized access to information
eavesdrops
sniffing: active/ passive
What is modification?
- change the information of a resource
Man-in-the-middle
What is fabrication?
- insertion of malicious objects into a system
malware
What is invasion?
- Taking control of a resource and stealing information
Session Hijacking
Five/six levels of intrusion ?
0: Normal System User- no intrusion
1: Intrusion occurs, but no evidence of damage and no trail is left. Example: Passive Sniffing
2: Intrusion occurs, there is no evidence of damage but a trail is left. Example: Active Sniffing
3: Files are damaged, programs and data are altered. Example: Malware
4: Services are disrupted. Example: Denial of Service
5: Cyber-espionage/Cyber-felony is committed – valuable information is stolen. Example: Session Hijacking
what are the anatomy of a Cyber Attack?
4 steps.
- Gather information
- Look for vulnerabilities
- Get access to the network
- Launch the attack
What are the tools for gather information?
- nslookup/dig IP address finder
- netcraft web server information gather
- traceroute IP address tracers
- Nmap port scan hosts finder
- wireshark traffic monitoring tools
What are the Techniques for Gaining Access to the Network?
- Password Crackers
- Keyloggers
- Address Spoofers
What is Denial of service Dos?
- Bring down a network so that legiBmate users cannot access it.
What is Man-in-the-middle attack?
- Traffic will now flow through the attacker’s machine without the knowledge of the client or the server
What is Data Modification ?
- Man-in-the-middle attack can be extended to perform data modification – insert/drop/alter packets in transit
What is Session Hijacking ?
watching an ongoing communication between a client and a server and recording session numbers, IP addresses
The aFacker then “zaps” the client with a DoS attack and then takes over the existing connection by spoofing the client to the server using the same addresses, session numbers,
What is Replay Attack ?
Watch an ongoing communication and record transaction and replay the recorded packets to the server later.
• Works when server does not save the state information.