System Hacking Flashcards

1
Q

Name 3 log-related methods of covering your tracks on a system hack

A

Disabling auditing
Clearing logs
Manipulating logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What technique for covering tracks on network is Target system sends a request to the remote system to act on the response.

A

Reverse shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What technique for covering tracks on network is Adding data payload to the target’s DNS server to create a back channel to steal information?

A

DNS tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technique for covering tracks on network is Using TCP parameters for payload distribution?

A

TCP parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What fields can you use to hide data in a TCP packet?

A

IP identification field
TCP acknowledgement number
TCP initial sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Privacy.sexy tool do?

A

Open source tool that can cleanup logs and personal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Auditpol tool do?

A

Microsoft tool to manipulate audit policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the MRU-blaster tool do?

A

Find and remove 30,000 Most Recently Used(MRU) lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the activity of Recovering passwords from the transmitted or stored data on computer systems?

A

Password Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the non-electronic, passive method of password attack is Collecting information from the target’s trash bins?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the non-electronic, passive method of password attack is Observing the target while they type in their passwords?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the non-electronic, passive method of password attack is Interacting with the target to trick them into revealing their passwords?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of password attack is Load a dictionary file into a password cracking program and The program checks the passwords against user accounts?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of password attack is Running every combination of characters until the password is cracked?

A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of password attack is Taking a dictionary and expanding it with guesses using brute-force?

A

Hybrid attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of password attack is when Attacker combines several other attacks to crack the password and Used when the attacker has some information about the password?

A

Rule-based Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What kind of password attack is when attacker Guess passwords either by humans or by automated tools using dictionaries and Requires the attacker to manually attempt to log into the target’s machine?

A

Password guessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Installed in target machine to get the target’s passwords and usernames.

A

Trojan/spyware/keylogger

19
Q

What kind of attack can be performed against systems that use hash functions for the user authentication?

A

Hash injection

20
Q

What kind of attack can take place when DNS fails to resolve name queries, the host sends a UDP broadcast message to other hosts asking them to authenticate themselves which can allow an attacker can listen for a NTLM has to crack?

A

LLMNR/NBT-NS poisoning

LLMNR = Link Local Multicast Name Resolution

NBT-NS = NetBIOS Name Service

21
Q

What kind of passive online attack is when Attackers sniff credentials by capturing packets that are being transmitted?

A

Wire sniffing

22
Q

What kind of passive online attack is when Attacker gains access to the communication channel between the target and server and then extracts information and data they need to gain unauthorized access?

A

Man-in-the-middle (MITM) attack

23
Q

What kind of passive online attack is when an attacker can replay information using e.g. extracted authentication token or hashed password after using a sniffer to capture packets and authentication tokens?

A

Replay attack

24
Q

What kind of attack is when Attacker never attempts to login to the application server that can be logged and attempts Cracking efforts on a separate system?

A

Offline attacks

25
Q

What kind of attack uses the power of machines across the network to decrypt passwords often Used for recovering passwords from hashes?

A

Distributed network attack (DNA)

26
Q

What kind of hash attack is faster than brute-force however the trade-off is that it takes a lot of storage to hold these kind of tables?

A

Rainbow table attack

27
Q

what kind of hash attack where attacker Tries to find two inputs resulting in same hash value?

A

Collision attack

28
Q

What kind of attack tries every possible combination of characters to break the encryption?

A

Brute-force attack

29
Q

What kind of attack is a brute-force attack that depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations?

A

Birthday Attack - Exploits birthday problem in probability theory

30
Q

What is the countermeasure where the longer the random string, the harder it becomes to break or crack the password and Generates different hashes for the same password?

A

Password Salting - Hash is used with salt (collection of random bits) to obscure the hash

31
Q

What is it called when attackers acquire the privileges of the same level of different users?

A

Horizontal privilege escalation

32
Q

What is Vertical privilege escalation?

A

Acquiring higher privileges

33
Q

What is Horizontal privilege escalation?

A

Acquiring the privileges of the same level

34
Q

What is pivoting in system hacking?

A

Using a compromised system as a launching point into other systems.

E.g. in Metasploit you can add route to first compromised system to access the network beyond it.

35
Q

What are some techniques on Windows to escalate privileges?

A

Access token manipulation

File system permissions weakness

Windows application shimming

Windows application shimming

Scheduled tasks

36
Q

What are some techniques on Mac OS to escalate privileges?

A

OS X applications dynamic library vulnerability

Launch Daemon

Meltdown vulnerability

Spectre vulnerability

37
Q

Name 5 Privilege escalation countermeasures

A

Apply least-privilege: Never grant more privileges than needed!

Use encryption and MFA

Run services as unprivileged accounts

Patch and update regularly

Ensure all executables are write-protected

38
Q

What does User Access Control (UAC) do on Windows?

A

Prompts user for potentially dangerous software in Windows

Limits softwares to user privileges until an administrator authorizes an elevation.

39
Q

Name 3 Privilege escalation tools

A

BeRoot to check common misconfigurations to find a way to escalate privileges on Linux and Windows

linpostexp: Linux post exploitation enumeration and exploit checking tools

Windows Exploit Suggester & Linux Exploit Suggester

40
Q

What are 4 classes of remotely executed malicious programs designed to steal information?

A

Programs that attackers install include:

Backdoors are designed to collect information and gain unauthorized access to the system

Crackers are designed to crack passwords

Keyloggers are designed to record keystrokes

Spyware are designed to capture screenshots and send them to the attacker

41
Q

What creates backdoor to the system to enable the attacker to access to the system? Hides itself, replaces certain system calls and does not spread by themselves

A

Rootkits

42
Q

what are the three Rootkit levels?

A

Ring 0 - Kernel level
Ring 1/2 - Device Drivers
Ring 3 - Applications

43
Q
A