System Hacking Flashcards
Name 3 log-related methods of covering your tracks on a system hack
Disabling auditing
Clearing logs
Manipulating logs
What technique for covering tracks on network is Target system sends a request to the remote system to act on the response.
Reverse shell
What technique for covering tracks on network is Adding data payload to the target’s DNS server to create a back channel to steal information?
DNS tunneling
What technique for covering tracks on network is Using TCP parameters for payload distribution?
TCP parameters
What fields can you use to hide data in a TCP packet?
IP identification field
TCP acknowledgement number
TCP initial sequence number
What does the Privacy.sexy tool do?
Open source tool that can cleanup logs and personal activities.
What does the Auditpol tool do?
Microsoft tool to manipulate audit policies.
What does the MRU-blaster tool do?
Find and remove 30,000 Most Recently Used(MRU) lists.
What is the activity of Recovering passwords from the transmitted or stored data on computer systems?
Password Cracking
What is the non-electronic, passive method of password attack is Collecting information from the target’s trash bins?
Dumpster diving
What is the non-electronic, passive method of password attack is Observing the target while they type in their passwords?
Shoulder surfing
What is the non-electronic, passive method of password attack is Interacting with the target to trick them into revealing their passwords?
Social engineering
What kind of password attack is Load a dictionary file into a password cracking program and The program checks the passwords against user accounts?
Dictionary attack
What kind of password attack is Running every combination of characters until the password is cracked?
Brute-force attack
What kind of password attack is Taking a dictionary and expanding it with guesses using brute-force?
Hybrid attack
What kind of password attack is when Attacker combines several other attacks to crack the password and Used when the attacker has some information about the password?
Rule-based Attack
What kind of password attack is when attacker Guess passwords either by humans or by automated tools using dictionaries and Requires the attacker to manually attempt to log into the target’s machine?
Password guessing
Installed in target machine to get the target’s passwords and usernames.
Trojan/spyware/keylogger
What kind of attack can be performed against systems that use hash functions for the user authentication?
Hash injection
What kind of attack can take place when DNS fails to resolve name queries, the host sends a UDP broadcast message to other hosts asking them to authenticate themselves which can allow an attacker can listen for a NTLM has to crack?
LLMNR/NBT-NS poisoning
LLMNR = Link Local Multicast Name Resolution
NBT-NS = NetBIOS Name Service
What kind of passive online attack is when Attackers sniff credentials by capturing packets that are being transmitted?
Wire sniffing
What kind of passive online attack is when Attacker gains access to the communication channel between the target and server and then extracts information and data they need to gain unauthorized access?
Man-in-the-middle (MITM) attack
What kind of passive online attack is when an attacker can replay information using e.g. extracted authentication token or hashed password after using a sniffer to capture packets and authentication tokens?
Replay attack
What kind of attack is when Attacker never attempts to login to the application server that can be logged and attempts Cracking efforts on a separate system?
Offline attacks