1 - Intro to Ethical Hacking Flashcards
What is Hack Value?
The notion that hackers determine something is worth doing.
What is a Vulnerability?
Existence of a weakness
What is an exploit?
A breach of an IT system.
What is a payload?
Part of the exploit code that performs the malicious action.
What is a Zero Day?
An exploit that doesn’t have a patch available for it yet.
What is Daisy Chaining?
Gaining access to one network or computer then using the same info to gain access to multiple networks or computers.
What is doxing?
Publishing personal identifiable information about someone collected from public DB’s or social media.
What is a bot?
A software application that can be controlled remotely to execute or automate predefined tasks.
What are the elements of security?
-
Confidentiality:
- Assurance that the information is only accessible only to those who have access.
- Techniques Include:
- Data Classification
- Access Control Lists
- Techniques Include:
- Assurance that the information is only accessible only to those who have access.
-
Integrity:
- Trustworthiness that the data hasn’t been tampered with
- Techniques Include:
- Using a hash value to check for changes
- Access Control
- File Integrity Checkers
- Techniques Include:
- Trustworthiness that the data hasn’t been tampered with
-
Availability:
- Assurance that the systems that are responsible for storing, processing, and delivering data are accessible.
- Techniques Include:
- Redundant data disk arrays
- Back-ups
- Techniques Include:
- Assurance that the systems that are responsible for storing, processing, and delivering data are accessible.
-
Authenticity:
- Ensures that a communication, data, or document is genuine.
- Techniques Include:
- Digital Certificates
- Biometrics
- Techniques Include:
- Ensures that a communication, data, or document is genuine.
-
Non-Repudiation:
- Guarantee that the sender of a message cannot deny sending the message nor can the recipient deny receiving the message.
- Techniques Include:
- Digital Certificates
- Message Receipts
- Techniques Include:
- Guarantee that the sender of a message cannot deny sending the message nor can the recipient deny receiving the message.
What is the Security, Functionality, and Usability Triangle?
-
Security:
- Restrictions imposed on accessing components of a system.
-
Functionality:
- Set of features provided by the system
-
Usability:
- Ease of use
- GUI components
What are security attacks composed of?
Attacks = Motives + Method + Vulnerability
- Motives (Goal):
- The notion that the target system stores or processes something valuable.
- Attackers try various tools/techniques to exploit vulnerabilities in a system/policy/control to achieve their goal.
- Common Motives:
- Monetary
- Disruption of business
- Theft
- Chaos
- etc.
What are some attack vectors?
-
Cloud Computing:
- Cloud computing is the on-demand delivery of IT services where the sensitive data for companies is stored.
- A flaw in this could allow attackers to attain access to critical data to potentially multiple customers data.
-
Advanced Persistent Threats:
- Attack where an attacker is stealing information from a victim’s machine without the victim knowing.
-
Viruses and Worms:
- Malicious software that could infect a network in seconds.
-
Ransomware:
- Malicious software that restricts access to a computer’s system files and demands payment for the return of the access.
- Payment doesn’t guarantee you will get access in a lot of cases.
-
Mobile Threats:
- Due to the increased proliferation of mobile devices used for business and personal purposes which generally have less restrictive security.
-
Botnet:
- Network of compromised systems used by an intruder to perform various attacks.
-
Insider Attack:
- Attack performed by an entrusted person who has an authorized access.
-
Phishing:
- The act of sending an illegitimate email falsely claiming to be from a legitimate site in an attempt to gain access or account/user information.
-
Web Application Threats:
- Targeting web applications to steal creds, set up phishing sites, or acquire private information
-
IoT Threats:
- Iot devices contain software that access the device remotely.
- Flaws could allow attackers access into this device.
What are the threat categories?
-
Network Threats:
- As information travels from one network to another, a malicious actor could break into the communication channel and steal the information traveling over the network.
- Techniques:
- Sniffing
- Spoofing
- DNS and ARP Poisoning
- Password-Based attacks
- FW and IDS attacks
-
Host Threats:
- Threats target a particular system on which valuable information resides.
- Techniques:
- Malware
- Profiling
- Password Attacks
- Foot Printing
- Privilege Escalation
- Backdoor attacks
- Physical Security Attacks
-
Application Threats:
- Attackers exploit the vulnerabilities present in an application to steal or destroy data.
- Techniques:
- Improper Data Validation
- Authentication Attacks
- Security Misconfig
- Improper Error Handling
- Hidden-Field manipulation
- Broken Session Management
- Buffer Overflow issues
What are the types of attacks on a system?
-
OS Attacks:
- Attackers search for vulnerabilities in the system’s design, installation, or configuration and exploit them to gain access to a system.
- Today’s OS’ are increasingly complex. Extensive tweaking is required to lock them down.
- Most OS installation programs install a large number of services and open ports.
- OS Vulnerabilities:
- Buffer Overflow
- Bugs in the OS
- Unpatched OS
-
Misconfiguration Attacks:
- Misconfig vulnerabilities affect web servers, application platforms, databases, networks, or frameworks that may result in illegal access or possible owning of the system.
- Admins should change the default config of the devices before deploying them in the production network.
- Remove any unneeded services or software.
-
Application-Level Attacks:
- Attackers exploit the vulnerabilities in applications running on org’s information system to gain unauthorized access and steal or manipulate data.
- Attacks:
- Buffer Overflow
- Cross-site scripting
- SQL injecting
- Man in the middle
- session hijacking
- Denial of Service
-
Shrink-Wrap Code Attacks:
- Attackers exploit default configuration and settings of the off-the-shelf libraries and code.
- Developers need to customize and fine-tune every part of their code in order to make it not only more secure but make it different enough where the same exploit will not work.
What is information warfare and what are the different types?
- The use of information and communication technologies (ICT) to take competitive advantages over an opponent.
-
Defensive Information Warfare:
- Refers to all strategies and actions to defend against attacks on ICT assets.
- Techniques:
- Prevention
- Deterrence
- Alerts
- Detection
- Emergency Preparedness
- Response
-
Offensive Information Warfare:
- Refers to information warfare that involves attacks against ICT assets of an opponent.
- Techniques:
- Web App Attacks
- Web Server Attacks
- Malware Attacks
- MitM Attacks
- System Hacking