28 - Cyber Reconnaissance Flashcards

1
Q

In order to attack a system, you nee to ___ a pillar

A

Violate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different barriers that make up an “information system”?

A
  1. Network Barrier (Outermost)
  2. Host Barrier (Middle)
  3. The Privilege Barrier (Inside)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Network Barrier

A

Between the Internet and the Host’s network

  • Protection
    • Perimeter Firewall
    • Network Address Translation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the Host Barrier

A

(Attacker doesn’t have Admin/Root privileges yet)

  • Protection
    • Authentication
    • Host-Barrier Firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Privilege Barrier

A

Attacker has Admin/Root acces

  • Trying to perform “privilege escalation”
  • Protection
    • Admin accounts
    • Encrypting sensitive files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three phases of a Cyber Attack?

A
  1. Reconnaissance
  2. Infiltration & Maneuver
  3. Exfiltration & Maintaining Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two kinds of Reconnaissance?

A
  1. Active
    1. Interacting with target network directly (ping, traceroute, netcat)
  2. Passive
    1. Minimize interaction with target network (friends, facebook)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some tools for Active Recon?

A
  • Ping
  • traceroute
  • netkitten (nk)
  • Scanning
    • NMAP (Network Mapper)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly