28 - Cyber Reconnaissance Flashcards
1
Q
In order to attack a system, you nee to ___ a pillar
A
Violate
2
Q
What are the different barriers that make up an “information system”?
A
- Network Barrier (Outermost)
- Host Barrier (Middle)
- The Privilege Barrier (Inside)
3
Q
Describe the Network Barrier
A
Between the Internet and the Host’s network
-
Protection
- Perimeter Firewall
- Network Address Translation
4
Q
Describe the Host Barrier
A
(Attacker doesn’t have Admin/Root privileges yet)
-
Protection
- Authentication
- Host-Barrier Firewall
5
Q
Describe the Privilege Barrier
A
Attacker has Admin/Root acces
- Trying to perform “privilege escalation”
-
Protection
- Admin accounts
- Encrypting sensitive files
6
Q
What are the three phases of a Cyber Attack?
A
- Reconnaissance
- Infiltration & Maneuver
- Exfiltration & Maintaining Access
7
Q
What are the two kinds of Reconnaissance?
A
- Active
- Interacting with target network directly (ping, traceroute, netcat)
- Passive
- Minimize interaction with target network (friends, facebook)
8
Q
What are some tools for Active Recon?
A
- Ping
- traceroute
- netkitten (nk)
- Scanning
- NMAP (Network Mapper)