System Hacking Flashcards

1
Q

Name 3 log-related methods of covering your tracks on a system hack

A

Disabling auditing
Clearing logs
Manipulating logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What technique for covering tracks on network is Target system sends a request to the remote system to act on the response.

A

Reverse shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What technique for covering tracks on network is Adding data payload to the target’s DNS server to create a back channel to steal information?

A

DNS tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technique for covering tracks on network is Using TCP parameters for payload distribution?

A

TCP parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What fields can you use to hide data in a TCP packet?

A

IP identification field
TCP acknowledgement number
TCP initial sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Privacy.sexy tool do?

A

Open source tool that can cleanup logs and personal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Auditpol tool do?

A

Microsoft tool to manipulate audit policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the MRU-blaster tool do?

A

Find and remove 30,000 Most Recently Used(MRU) lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the activity of Recovering passwords from the transmitted or stored data on computer systems?

A

Password Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the non-electronic, passive method of password attack is Collecting information from the target’s trash bins?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the non-electronic, passive method of password attack is Observing the target while they type in their passwords?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the non-electronic, passive method of password attack is Interacting with the target to trick them into revealing their passwords?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of password attack is Load a dictionary file into a password cracking program and The program checks the passwords against user accounts?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of password attack is Running every combination of characters until the password is cracked?

A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of password attack is Taking a dictionary and expanding it with guesses using brute-force?

A

Hybrid attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of password attack is when Attacker combines several other attacks to crack the password and Used when the attacker has some information about the password?

A

Rule-based Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What kind of password attack is when attacker Guess passwords either by humans or by automated tools using dictionaries and Requires the attacker to manually attempt to log into the target’s machine?

A

Password guessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Installed in target machine to get the target’s passwords and usernames.

A

Trojan/spyware/keylogger

19
Q

What kind of attack can be performed against systems that use hash functions for the user authentication?

A

Hash injection

20
Q

What kind of attack can take place when DNS fails to resolve name queries, the host sends a UDP broadcast message to other hosts asking them to authenticate themselves which can allow an attacker can listen for a NTLM has to crack?

A

LLMNR/NBT-NS poisoning

LLMNR = Link Local Multicast Name Resolution

NBT-NS = NetBIOS Name Service

21
Q

What kind of passive online attack is when Attackers sniff credentials by capturing packets that are being transmitted?

A

Wire sniffing

22
Q

What kind of passive online attack is when Attacker gains access to the communication channel between the target and server and then extracts information and data they need to gain unauthorized access?

A

Man-in-the-middle (MITM) attack

23
Q

What kind of passive online attack is when an attacker can replay information using e.g. extracted authentication token or hashed password after using a sniffer to capture packets and authentication tokens?

A

Replay attack

24
Q

What kind of attack is when Attacker never attempts to login to the application server that can be logged and attempts Cracking efforts on a separate system?

A

Offline attacks

25
What kind of attack uses the power of machines across the network to decrypt passwords often Used for recovering passwords from hashes?
Distributed network attack (DNA)
26
What kind of hash attack is faster than brute-force however the trade-off is that it takes a lot of storage to hold these kind of tables?
Rainbow table attack
27
what kind of hash attack where attacker Tries to find two inputs resulting in same hash value?
Collision attack
28
What kind of attack tries every possible combination of characters to break the encryption?
Brute-force attack
29
What kind of attack is a brute-force attack that depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations?
Birthday Attack - Exploits birthday problem in probability theory
30
What is the countermeasure where the longer the random string, the harder it becomes to break or crack the password and Generates different hashes for the same password?
Password Salting - Hash is used with salt (collection of random bits) to obscure the hash
31
What is it called when attackers acquire the privileges of the same level of different users?
Horizontal privilege escalation
32
What is Vertical privilege escalation?
Acquiring higher privileges
33
What is Horizontal privilege escalation?
Acquiring the privileges of the same level
34
What is pivoting in system hacking?
Using a compromised system as a launching point into other systems. E.g. in Metasploit you can add route to first compromised system to access the network beyond it.
35
What are some techniques on Windows to escalate privileges?
Access token manipulation File system permissions weakness Windows application shimming Windows application shimming Scheduled tasks
36
What are some techniques on Mac OS to escalate privileges?
OS X applications dynamic library vulnerability Launch Daemon Meltdown vulnerability Spectre vulnerability
37
Name 5 Privilege escalation countermeasures
Apply least-privilege: Never grant more privileges than needed! Use encryption and MFA Run services as unprivileged accounts Patch and update regularly Ensure all executables are write-protected
38
What does User Access Control (UAC) do on Windows?
Prompts user for potentially dangerous software in Windows Limits softwares to user privileges until an administrator authorizes an elevation.
39
Name 3 Privilege escalation tools
BeRoot to check common misconfigurations to find a way to escalate privileges on Linux and Windows linpostexp: Linux post exploitation enumeration and exploit checking tools Windows Exploit Suggester & Linux Exploit Suggester
40
What are 4 classes of remotely executed malicious programs designed to steal information?
Programs that attackers install include: Backdoors are designed to collect information and gain unauthorized access to the system Crackers are designed to crack passwords Keyloggers are designed to record keystrokes Spyware are designed to capture screenshots and send them to the attacker
41
What creates backdoor to the system to enable the attacker to access to the system? Hides itself, replaces certain system calls and does not spread by themselves
Rootkits
42
what are the three Rootkit levels?
Ring 0 - Kernel level Ring 1/2 - Device Drivers Ring 3 - Applications
43