System Hacking Flashcards

1
Q

explian the staps of network pivoting

A

1- dicover other hosts in the network
2- add a route to the internal network
3-ensure it was added to the routing table
4-auxiliray/scanner/portscan/tcp can be uses to determine open ports and wethere there are other host alive in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

once a hacker gained unauthorized acess to system and esclate the privleges, it is time for____ and it is called ___

A

execute malicious application. it is called system owning or owning the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why does a hacker excute applications?

A
  • collect info
  • gather detailed info by capturing keystrokes
  • maintain acess
  • crack password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what kind of malicious programs attackers execute on target system

A
  • keyloggers
  • spyware
  • crackers
  • backdoors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain the steps of creating a backdoor

A

1- create the payload
2- uploading backdoor file
3-excuting backdoor
4- add entry in windows registery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the common tool used for creating backdoors?

A

msfvenom
msfvenom -p [payload] -f [format] LHOST=[your ip]
LPORT=[your listener port]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the objectives of rootkits?

A
  • to root the host system and gain remote backdoor access

- to mask the attackers’ tracks and the presence of malicious application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what command/utitlity is used to disable audting?

A

auditpol.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what utlity is used for clearing logs?

A

clearlogs.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly