SECFND 10: Common Endpoint Attacks Flashcards

1
Q

Local Exploit

A

requires prior access to the vulnerable system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Remote Exploit

A

works over the network without any prior access to the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Best buffer overflow avoidance

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Idle Scan

A

Uses an idle “zombie” host to veil recon from attacking system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password spraying

A

Using very weak passwords one or two times to not generate a lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IRC

A

Often used to control botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smishing

A

SMS Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

XSS consequences

A

Steal session cookies, redirecting the victim to another site, or retrieve data from the victim’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exploit kit

A

automated framework attackers use to discover and exploit vulnerabilities in an endpoint, infect it with malware, and execute malicious code on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain shadowing

A

compromising domain registration information for legitimate domains, and registering malicious second-level subdomains such as ek.example.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web based exploit kit

A

Typically uses PHP scripts hosted on exploit kit server and provides management console to attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exploit kit functionality

A

Scans host for vulns. Once identified, it sends request to server for exploit code to compromise vuln SW. Code then connects victim to download server to download payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

../ in uri

A

Indication of directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

whoami

A

show the user account and domain information as applicable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

netstat -anop

A

how all active, listening, and closed network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

quser

A

list the users who are logged on to system.

17
Q

tasklist

A

list all the running processes.

18
Q

schtasks

A

show all the tasks set to run on the system at certain intervals.

19
Q

sc

A

list all the services set to run on the system.

20
Q

net start

A

Start services to run on a system.

21
Q

Metasploit

A

Pentesting tool

22
Q

Meterpreter

A

Payload within the Metasploit Framework that provides control over an exploited target host. Resides completely in memory.

23
Q

Mimikatz

A

Meterpreter script. Credential theft inc. plaintext passwords, hashes, PIN’s, and Kerberos tickets.

24
Q

Angler gates

A

Redirection sites to get someone to the final Angler landing page.

25
Q

Angler proxy servers

A

People interact with these. Provide actual compromise of victims

26
Q

Angler exploit servers

A

Contain exploit code. Exploit code sent to proxy server

27
Q

Angler status server

A

Tracks HTTP connections

28
Q

Angler Master Server

A

Contains connection and log data