Attacks and Exploits Flashcards

1
Q
  • Scan Active Directory for user accounts with service principal names (SPNs) set.
  • Request service tickets using the SPNs.
  • Extract the service tickets from memory and save to a file.
  • Conduct an offline brute-force attack against the passwords in the service tickets.
A

Kerberoasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Implemented in motherboards made by some manufacturers for diagnostic and testing purposes
  • With the right equipment, a penetration tester can connect to this port and capture data directly from the running motherboard.
A

JTAG Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when an attacker manipulates an egress sensor to unlock a door.

A

Egress sensor bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An exploit that causes the return address of a subroutine to be replaced by the address of a subroutine that is already present in a processes’ memory

A

Ret2libc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A client-side security misconfiguration that allows a script running within a browser to write data to a client-side cookie.

A

Cookie manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Assigning an executable on Linux this permission allows it to run with the permissions of the file’s owner.

A

SUID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Assigning an executable on Linux this permission allows it to run with the permissions of the group owning the asset

A

SGID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • A process that runs on a Windows system to enforce the security policy on the system
  • Verifies users that log on to the system, manages user password changes, creates access tokens, and makes entries to the Security log.
A

Local Security Authority Subsystem Service (LSASS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to remotely manage Macintosh systems over a network connection using a graphical user interface

A

Apple Remote Desktop (ARD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to apply rotational pressure to the lock (in the unlock direction)

A

Tension Wrench

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to apply rotational pressure to the lock (in the unlock direction)

A

Tension Wrench

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Attempts to enumerate user accounts through null sessions
  • If a tester specifies a password file, it will automatically attempt to brute force the user accounts when it’s finished enumerating
A

RID cycling attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Protocol loosely based on the DNS packet format

- Allows IPv4 and IPv6 hosts to perform name resolution for other hosts on the same local network without a DNS server

A

Link-Local Multicast Name Resolution (LLMNR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Wireless exploit, an unauthorized Bluetooth connection is established with a wireless device
  • Connection is then used to steal information from that device.
A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • When an attacker sends unsolicited messages over Bluetooth devices
  • Allows an individual to send anonymous messages to Bluetooth-enabled devices within a certain radius
A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an intruder tags along with an authorized person through a physical barrier, such as a locking door or a turnstile

A

Tailgating

17
Q
  • An extension to X.509 that allows various values to be associated with a security certificate using a ________ field.
  • These values include email addresses, IP addresses, URLs, DNS names, and directory names.
A

Subject Alternative Name (SAN)

18
Q
  • Invokes services/actions on a remote computer
  • PsExec – Utility for Windows OS that allows for the execution of processes on remote systems
  • WMI (Window Management Instrumentation) – A part of PowerShell used for monitoring Remote Window devices
  • Scheduled tasks – When a job run a remote connect
A

Remote Procedure Call (RPC)/Distributed Component Object Model (DCOM)

19
Q
  • Attacks rely on following employees in through secured doors or other entrances.
A

Piggybacking