504.4 Flashcards

1
Q

Metasploit Framework

A

A flexible collection of tools to attack, exploit, and harvest data from targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit

A

Takes advantage of a flaw in a target program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Payload

A

Makes the target do something the attacker wants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auxiliary Modules

A

Performs all kinds of tasks, including port scans, vulnerability scans, DOS tools and fuzzers to find flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bind Shell to Arbitrary Port

A

This opens a command shell listener on any tcp port of the attackers choosing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reverse Shell

A

This payload shovels a shell back to the attacker on a TCP port. The attacker will likely have
a Netcat listener waiting to receive the shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows VNC Server DLL Inject

A

This payload allows the attacker to remotely control the GUI of the victim machine, using the Virtual Network Computing (VNC) tool, sent as a payload. VNC runs inside the victim process so it doesn’t need to be installed on the victim machine. Instead, it is inserted as a DLL inside the vulnerable process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Create local admin user

A

This payload creates a new user in the administrators group with a name and password specified by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Drive By Attacks

A

AKA Client side attacks, target normal web browsing activity allowing an attacker to gain access to a client device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Watering Hole Attack

A

Same technique as Drive By Attacks except it involves a targeting element against a specific vertical industry or other organization such as the Gov, political party, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Code-Executing Microsoft Office Files

A

Execute code in a microsoft-office file. Requires macro support file type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MsfVenom

A

A tool that is included in the Metasploit Framework that takes any Metasploit payload and
converts it to a standalone file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System Resource Usage Monitor (SRUM)

A

Built-in windows service, maintains a 30 day historical record of system activity including programs executed, wifi networks joined, network use statistics by executable, system energy usage and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SRUM-Dumo

A

Utility that extracts the data from the SRUDB.dat file and HKLM\SOFTWARE registry key, writing the data to an accessible spreadsheet. Can operate on a live workstation or read from an offline archive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command Stacking

A

The use of command separators to run multiple commands in one line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command Injection

A

A web application exploitation technique to run arbitrary commands on the web server. The attacker identifies an application that accepts input and the input is used to form a command line that is executed on the server.

17
Q

Reflected XSS

A

Targeted attack where the attacker crafts a link with malicious code to send to the victim. Victim clicks on the link and goes to the vulnerable site which will render content delivered from a crafted URL sent by the attacker.

18
Q

Stored XSS

A

Malicious content from the attacker is stored and delivered from the server. Any user who visits the server webpage storing the malicious content will render it. More opportunistic because anyone who visits the webpage renders the malicious code.

19
Q

Cross Site Scripting

A

An attack against users as opposed to servers. Exploits a vulnerability in the server input or output validation. Allows an attacker to send custom commands on behalf of the server to the victim

20
Q

Server Content Security Policy (CSP)

A

Server declares which dynamic resources are permitted to load in the browser e.g JavaScript, CSS, images etc.

21
Q

Structured Query Language (SQL) Injection

A

Web attack technique that exploits input validation flaws on applications that accept user input to interact with databases. The attacker supplies a crafted string that is accepted by the web server and applied as part of a SQL statement used to interact with a backend database.

22
Q

SQL Verb

A

The part of the SQL statement that identifies what action is taken, such as SELECT to query a database, UPDATE to change one or more database entries, and DELETE to remove one of more database rows.

23
Q

SQL Source

A

The part of the SQL statement indicates one or more table names that the verb is applied to.

24
Q

SQL Refinement

A

The part of the SQL statement used to limit the scope of the action beyond the table name by identifying specific columns or values that should be used. Not always present.

25
Q

sqlmap.py

A

Automate testing for sql injection vulnerabilities via database enumeration tasks

26
Q

Server Side Request Forgery

A

Web servers can take user input and create web requests on behalf of the client. An attacker can manipulate the input to get the server to make arbitrary HTTP requests and compromise the server.

27
Q

Internet Metadata Service (IMDS)

A

A system used by popular cloud providers to provide dynamic metadata about a cloud instance. Can be leveraged to obtain sensitive information.