5-37.2 Authentication and Access Control Attacks Flashcards

1
Q

This post-exploitation attack exploits the use of hashed passwords

A

Pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This type of capture requires access to a network traffic sniffer

A

Packet capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This form of brute force attack limits itself to well known words

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This attack exploits vulnerabilities or weaknesses in a system to gain unauthorized access to higher level privileges

A

Vertical Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication system vulnerable to post-exploitation silver and golden ticket attacks

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly