4. Ethical Hacking Flashcards
1
Q
computer misuse act
A
unethical hacking is against the law
- unauthorised access to computer materials
- unauthorised access with intent to commit of facilitate crime
- unauthorised modification computer materials
2
Q
what is hacking
A
breaking into computer systems for personal, professional, military gains
3
Q
international laws
A
when actions cross borders, abide by MOUs. If not look at ethics
4
Q
what is a hacker
A
anyone who breaks into computer system
- white hat
- authorised to hack - black hat
- unauthorised
- malicious intent - grey hat
- sometimes good sometimes bad
communicate with leet speak (1337)
greatest risk are unhappy employees
5
Q
types of pen testing
A
- black box
- attacker is in steath mode
- typically, attacker has no preknowledge of target system
- employees may be included in the test - white box
- tester is open and thorough
- test all known assets of the system
- does not need to cover tracks
- detailed information regarding target is known prior
6
Q
pen testing activites
A
- reconnaissance
- scanning and enumeration
- exploitation
- post exploitation
- covering tracks
7
Q
reconnaissance
A
gather information about target
- google dorking
- social engineering
- dumpster diving
- looking for names, emails, IP address, technologies used, vulnerabilities of technologies
- passive
- gather data without target knowledge - active
- interact directly with target
8
Q
scanning and enumeration
A
- have a list of ip address to attack
- scan the ports of each IP to look for open ports
- services running behind port can be attacked
- use pings to check if target is up before scanning
9
Q
exploitation
A
- know what exploits to run against known vulnerability
- exploit with suitable tools and techniques
- goal is to get admin access
10
Q
post exploitation
A
- most payload do not give permanent access
- setup backdoor or account to maintain access even if system gets rebooted
11
Q
cover tracks
A
black hat
- wants to keep using techniques and tools
- hide exploit files
- erase presence
white hat
- restore system to original state
- write pen test report that covers the scope, objectives, records, findings, and how to patch vulnerabilities