CEH Certified Ethical Hacker Class Flashcards

1
Q

DNS poisoning

A

Modifying the DNS server so it might send out the bad guys address instead of the correct address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing

A

The creation of Internet Protocol (IP) packets with false source IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pharming

A

redirection to a bogus site (harvest large groups of people)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing-

A

Collect access credentials redirecting the user and presenting them with something that looks familiar, but is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats come from many areas:

Physical- _________________________

A

Theft, intrusion, sabatage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threats come from many areas:

Natural- _________________________

A

Disasters

-Earthquakes, weather related natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threats come from many areas:

Human- _________________________

A

Hackers, social engineering, security training, insider-threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats come from many areas:

Network- _________________________

A

Spoofing, sniffing, ARP, Dos, MitM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats come from many areas:

Host (based attacts)- _________________________

A

Malware, password, code, exec, Back Door, Footpring, DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats come from many areas:

Application- _________________________

A

Session Mgmt, Input validation, authentication, Buffer overflow, error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP

A

The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address associated with a given IPv4 address, a critical function in the Internet protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are areas (ethical hacker/hacker) threats can come from?

A

Physical- theft, intrusion, sabatage
Natural- ie earthquakes, and other natural disasters
Human- Hackers, Social engineering, insider threats
Network- Spoofing, sniffing, ARP, Dos MitM
Host (host based attacks)-malware, backdoor, footprintng
Application- Authentication, Error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?

A

cloud,
cyber crime,
insider threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?

A

botnets
Deficient Security policies
Networked applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?

A

Mobile Devices
Audit compliance
Insufficient security funding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some attack vectors (paths by which a hacker can gain access to a host in order to deliver a payload or malicious outcome)?

A

social networking
unpatched software
malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unpatched software

A

A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually called bugfixes or bug fixes, and improving the usability or performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethical Hacking Attack Phases

A

Recon
Scan
Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethical Hacking Attack Phases

A
Recon
Scan
Access
Maintain (Access)
Cover Tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DoS

A

Denial of Service attack- denies the clients/host the ability to use the network (the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.) leads to unavailability or very slowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A DoS or DDoS (distributed) attack analogy

A

A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, disrupting trade.

22
Q

Recon Phase of Ethical Hacking

A

Information gathering ie operating system, services

23
Q

passive recon-

A

gathering intel without target interaction (ie just using the internet to gather info and use tools available on the internet

24
Q

active recon-

A

Interacting with the target to gather intel

25
Q

scan (phase of ethical hacking attack)

A

using tool to automatically scan devices - probe for network ports, live hosts, open ports. operating system details

26
Q

access (phase of ethical hacking attack)

A

Exploiting a vulnerability (that we have discovered) to gain access to the system. Part of that process will also be privilege escalation which could include :

  • password cracking
  • buffer overflows
  • session hijack
27
Q

maintain (access) (phase of ethical hacking attack)

A

Once we have access, we want to maintain it:
- back doors - so we can get back in
- root kits - provide ways to get back in
& can help hide tracks
-binary executable replacement
- launch point of future attacks

28
Q

cover tracks (phase of ethical hacking attack)

A
  • evidence of a breech removed
  • modify or deleting log files
  • history of sessions removed
29
Q

DHCP Snooping

A

you tell the switch the only port the trusted port the offer traffic…. since you set up the If you see xxxxx
DHCP snooping acts like a firewall between trusted DHCP servers and untrusted hosts. … When DHCP snooping is enabled on a switched network or VLAN, it examines all DHCP messages sent from untrusted hosts associated with the network or VLAN and extracts their IP addresses and lease information only letting through trusted port xxxxx

30
Q

ARP

A

When one machine needs to communicate with another, it looks up its ARP table.

31
Q

ARP spoofing

A

ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network.

32
Q

Threats of ARP Poisoning

A

Using fake ARP messages, an attacker can divert all communication between two machines so that all traffic is exchanged via his/her PC

33
Q

DNS Poisoning techniques

A

tricks a DNS server into believing that it has received authentic information when, in reality, it has not. It results in a substitution of a false IP address at the DNS level where web addresses are converted into numeric IP addresses.

34
Q

How do I know if someone is sniffing?

A

Ping method- send ping request to the suspect machine

35
Q

These hackers do not have permission or authorization for their activities; Typically their actions fall outside the law.

A

Black Hats

36
Q

These hackers have permission to perform their tasks and never share information about a client with anyone other than that client.

A

White Hats

37
Q

These hackers cross into both offensive and defensive actions at different times.

A

Grey Hats

38
Q

These hackers use hacking to push or promote a political agenda. Targets have included government agencies and large corporations.

A

Hactivists

39
Q

May attract an above average level of attention from an attacker.

A

Hack value

40
Q

The act of targeting and actively engaging a TOE

A

Attack

41
Q

TOE

A

Target of Evaluation (specified in a contract with the client)

42
Q

Clearly defined way to breach the security of a system

A

Exploit

43
Q

A threat of vulnerability that is unknown to developers and has not been addresses. It is considered a serious problem in many cases.

A

Zero Day

44
Q

The state of well-being in an environment- Only actions that are defined are allowed

A

Security

45
Q

Potential violation of security

A

Threat

46
Q

Threat

A

Potential violation of security

47
Q

primarily using passive methods of gaining information from a target prior to performing the later active methods

A

Footprinting

48
Q

the phase in which you take the information learned from the footprinting phase and use it to target your attack much more precisely-

A

Scanning Phase

49
Q

performing ping sweeps, port scans and observations of facilities.

A

included as examples of scanning

50
Q

scanning includes

A

performing ping sweeps, port scans and observations of facilities.

51
Q

Enumeration

A

Where you extract much more detailed information about what you uncovered in the scanning phase to determine if it is useful.

52
Q

Where you extract much more detailed information about what you uncovered in the scanning phase to determine if it is useful.

A

Enumeration