Section 3.2 Flashcards

(48 cards)

1
Q

One of the most important skills a hacker can have.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is the art of convincing people that you are worthy of knowing information and you have the ability to convince someone you are who you say you are.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two techniques to gain information
1.
2.

A
  1. Shoulder surfing

2. Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Looking over someone’s shoulder and watching what they are doing. Watch and see where their fingers go when typing a password. You have to know how to not get caught.

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phone phreaker love to look outside of phone companies in the what?

A

Dumpster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unless you are trespassing on someone’s land you are allowed to dumpster dive. When the trash is taken to the curb anyone can go through it. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

He went into blockbuster and pretended he was from corporate and trying to fix their problem. They tell him their isn’t a problem and he gives them his card and then goes home and creates the problem . They call him and he goes back to “fix” the problem and gets the users username and password and then he goes through user records and all their information. Who did this?

A

Kevin Mitnick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You create a fake situation in order to advance some agenda.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Way to get through physical security. Example: if you walk right behind someone the human instinct is to hold the door. This is known as what?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Get a heavy box and act like you cannot get into your pocket to get your card swipe out. This is known as what?

A

Tailgating from the front

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any time you find something wrong with a system.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL injection is a what?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero-day vulnerability is something that no one knows about yet but you. There are trophies of the zero-day vulnerabilities.

A

Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Downloaded or hacked software can be referred to the exploits that people code and give it to my buddies.

A

“Warez”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

People who are expected to be there.

A

Internal hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Everyone else on the network that is not expected to be there?

A

External hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IF you work at the bank and attack the bank.

A

Internal hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IF you don’t work at the bank and you attack the bank

A

External hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Most attacks are internal or external?

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most attacks are internal. True or False

21
Q

IT person who knows they are about to get fired is a potential hacker.

22
Q

Most companies spend more time trying to prevent external hacks when they need to spend more time on internal. True or False

23
Q

Me and you

A

Non-Nation State

24
Q

Military Organizations

A

Nation States

25
STUXNET is a Nation State Hacker. True or False
True
26
One of the most complicated viruses in human history. Created by a nation state as an attack on another nation state. Created to attack Iranian nuclear facilities.
STUXNET
27
If a normal person were to create a hack it would be considered a non-nation state. True or False
True
28
Hackers who steal money and steal information. All the negative stuff
Black Hats
29
Work for companies, bug hunters, try to fix things
White Hats
30
In the middle between good hackers and bad hackers
Gray Hats
31
The division between hackers comes form what?
Westerns
32
Good cowboy vs. Bad Cowboy depending on the type of hat they wore.
White Hat vs. Black Hat
33
Who are hackers?
Age Race Education Gender
34
Stereotype hackers are what
Young White Educated Males
35
Compared to other criminals' hackers are younger, more likely to be white, more educated, and more likely to be female. Hacking is still a majority male crime, but it is less majority than street crime. True or False
True
36
Hackers are more likely to be _______.
Female
37
The majority of hackers are still ______ but there are more _______ than street crimes.
Male | Female
38
Anonymous is the most famous what?
hacking group
39
Very organic, changes everyday, hierarchical, support for each other, and provide competition to accomplish goals.
Anonymous
40
DEF Con in Las Vegas is a what?
Hacking Convention
41
Hackers have to have a certain level of secrecy but hey love talking to other hackers. True or False
True
42
Love for their devices. They love the newest technology and want to figure out how everything works.
Hackers in the hacking community
43
The most help someone will give you is someone pointing you to the Manuel, but you have to do it yourself. A hacker will not walk you through each step. True or False
True
44
If you want to be elite you have to do the work yourself this means putting in the _____ time.
Study
45
If you can show you are able to do this it shows that you have taken the time to figure it out and you have mastered it. It gains you status in the hacking community. This demonstrates what?
Demonstration of mastery
46
Hackers can have secrecy by using what?
Handles
47
Names given to people so they font have to use their real name. It is extremely important to a hacker.
Handles
48
Technology | Knowledge and Secrecy are three things that the ______ community values.
Hacker