504.5 Flashcards

1
Q

Ghost

A

Modifying the assembly of an executable in order to bypass an EDR systems by inserting junk code. The junk code modifies the program but with no lasting changes to how the program executes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defender Check

A

Takes a malicious file and scans it on a local windows 10 machine with windows Defender. If the file code raises an alert it will split the code into 2 smaller chunks and scan each piece independently while discarding the code that did not trigger the alarm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Metasm Framework

A

Tool that uses scripts to disassemble payload raw source code into ASCII assembly source code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keyed Payloads

A

A technique where the payload is encrypted using a key that is taken from an environment variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Live of the Land

A

Instead of adding third party executables, the attacker reuses existing tools to accomplish their goals. Because these existing tools are generally considered non-malicious by the infected OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MSBuild

A

A built-in tool for building and executing C, C++, C# code. An attacker can use MSBuild to run code written in any of these languages by compiling and running a source file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hijacking Attack

A

An adversary responds to system requests for services and pretends to be the legitimate system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Responder

A

Hijacking tool that impersonates servers and harvest credentials. (works with SMB and other protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UTMP File

A

Unix file for storing info about all users currently logged into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

wmtp file

A

stores information about all the users who have ever logged on to the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

btmp file

A

stores information about bad login attempts. often disabled by sysadmins because a file would be left around containing passwords in clear text if users entered passwords into username field and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

lastlog file

A

shows information associated with the most recent login time and date for each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Persistence goals

A

1) Regain Access
2) Avoid Detection
3) Preserve Privileges
4) Flexible in reestablishing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

persistence_service

A

metasploit module for automating the process of creating a service and automatically running an automatically-generated payload written to a temporary directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

silent exit process

A

Target process can be launched when another process exits. intended for developers to use to launch a debugger process when a target process terminates (normally or unexpectedly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Real Intelligence Threat Analytics (RITA)

A

Offline tool that uses statistical threat identification to analyze data over time for threat hunting instead of packet analysis. 24 hr packet capture is ideal.

17
Q

Exploded DNS Analysis

A

Shows you the unique sub-domain and reference count. Look for irregularly high number of sub-domains

18
Q

Security Token Service

A

AWS service that allows users to request temporary IAM credentials with limited privileges. Serves as a post-exploitation account enumeration technique for attackers

19
Q

WeirdAAL

A

Python script that automates the process of enumerating AWS access privileges and cloud assets.

20
Q

AzureStealth

A

Windows tool for enumerating shadow admin accounts.

21
Q

Pacu

A

AWS interrogation and attack framework similar to metasploit. Includes several exploit and enumeration modules.

22
Q

Cloud Mapper

A

Discovers and illustrates relationships in an AWS environment

23
Q

atbroker

A

a way to start malware through a trusted library (atbroker.exe) so an attacker can bypass endpoint protection