Book 5 Flashcards

1
Q

Pivoting

A

allowing attacker to go from initial compromise to attack other internal hosts within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Meterpreter pivoting

A

Meterpreter C2 framwork - attackers reuse c2 to pivot to new hostss within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Meterpreter C2 framework

A

deployed as initial exploit(PsExec lab) or through an independent payload generated using msfVenom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Meterpreter Pivoting options

A
  1. start a proxy server with auxillary/server/socks4a, connect through pivot ( proxy listens on attacker, sends through pivot)
  2. Reuse Meterpreter session with a new ROUTE to internal target
  3. Forward a specific port on the attacker to a remote destination port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

portfwd

A

used to specify a specific port and ip address within a network that the attacker wants to connect to. Can be used for any combitation of IP address and TCP port desired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

portfwd example

A

attacker listen on attacking system port 8000. Any connection to port 8000 will forward through the Meterpreter C2 link to the victim system at 10.10.10:80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

portfwd add -l 8000 -p 80 -r 10.10.10.100

A

“listen on my local attacker system on port 8000. Foward all that activity to port 80 on the remote host 10.10.10.100 . Any connection to 8000 will pivot meterpreter session to 10.1010.100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

route

A

meterpreter command. Sets up a pivot through the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

arp_scanner

A

used after the route command to enumerate hosts on the network (IP & MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSH -D

A

start a SOCKS proxy server on attacker system. allows for the use of any SOCKS proxy-aware client to communicate through he SSH tunnel to a destination target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ssh port forwarding

A

very flexible for port fowarding. listening port is on atttacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

netsh port forwarding

A

netcat and named pipes. listening port is on victim NOT attacker. unlike meterpreter port foward or ssh tunneling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Invoke-WebRequest

A

is an alias for curl and wget but on windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lateral movement

A

act of exploiting targets through pivots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

lateral movemment types of attacks

A

MITM

Local Password harvesting ..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pivoting techniques

A
  1. meterpreter route
  2. meterpreter portfwd
  3. meterpreter auxillary modules