6. Infrastructure Attack Flashcards

1
Q

Metasploit

A

Framework to:

  1. Scan Network
  2. Enumeration
  3. Exploitation
  4. Privilege Escalation
  5. Lateral Movement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

System Weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit

A

Attack performed on weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Payload

A

Code that runs after the exploit is done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SearchSploit

A

gathers recent information about exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

msfconsole

A

Metasploit tool

  1. Search
  2. Use
  3. Set
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metasploit Search

A

search [name]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reverse Shell Types

A
  1. Bind Shell: Connects to target to gain remote shell

2. Reverse Shell: Attacker runs a listener, Target connects with shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

msfvenom

A

Metasploit tool using msfpayloads and msfencode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Meterpreter

A
Metasploit Payload running in memory.
1. Getuid
2. pwd
3. ls/cd
4. Download
5. Session
6. Background
7 Clearev
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lateral Movement

A

use credentials from one computer to gain access to another computer in the same level in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eternal Blue

A

created by NSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bloodhound

A

Collects info on attacked network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Neo4j

A

set up DB user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protection against Automated Tools

A
  1. Update
  2. Endpoint Security = Antivirus
  3. Be Aware