CEH Certified Ethical Hacker Class Flashcards
DNS poisoning
Modifying the DNS server so it might send out the bad guys address instead of the correct address
Spoofing
The creation of Internet Protocol (IP) packets with false source IP addresses
Pharming
redirection to a bogus site (harvest large groups of people)
Phishing-
Collect access credentials redirecting the user and presenting them with something that looks familiar, but is not
Threats come from many areas:
Physical- _________________________
Theft, intrusion, sabatage
Threats come from many areas:
Natural- _________________________
Disasters
-Earthquakes, weather related natural disasters
Threats come from many areas:
Human- _________________________
Hackers, social engineering, security training, insider-threats
Threats come from many areas:
Network- _________________________
Spoofing, sniffing, ARP, Dos, MitM
Threats come from many areas:
Host (based attacts)- _________________________
Malware, password, code, exec, Back Door, Footpring, DOS
Threats come from many areas:
Application- _________________________
Session Mgmt, Input validation, authentication, Buffer overflow, error handling
ARP
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address associated with a given IPv4 address, a critical function in the Internet protocol suite.
What are areas (ethical hacker/hacker) threats can come from?
Physical- theft, intrusion, sabatage
Natural- ie earthquakes, and other natural disasters
Human- Hackers, Social engineering, insider threats
Network- Spoofing, sniffing, ARP, Dos MitM
Host (host based attacks)-malware, backdoor, footprintng
Application- Authentication, Error handling
What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?
cloud,
cyber crime,
insider threats
What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?
botnets
Deficient Security policies
Networked applications
What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?
Mobile Devices
Audit compliance
Insufficient security funding
What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?
social networking
unpatched software
malware
unpatched software
A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually called bugfixes or bug fixes, and improving the usability or performance.
Ethical Hacking Attack Phases
Recon
Scan
Access
Ethical Hacking Attack Phases
Recon Scan Access Maintain (Access) Cover Tracks
DoS
Denial of Service attack- denies the clients/host the ability to use the network (the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.) leads to unavailability or very slowed