CEH Notes from Austin Flashcards
Cross Site Request Forgery (XSRF)
Web browser vulnerability in which the hacker conducts the transaction from the user account without his consent. Clicks malicious link.
Cross-Site Scripting (XSS)
Web application attack where the attackers exploit vulnerability in dynamically generated web pages to inject client-side script into web pages viewed by other users. STEAL COOKIES.
DNS Cache Spooping
An enumeration technique in which theh hacker queries the DNS server for a specific cached DNS record and determines the sites recently visited by the org users. Determines specific sites visited by user.
DNS Hijacking
Type of cyber attach in which DNS searches are manipulated in order to redirect users to malicious sites.
Evil Twin
Jamming/Scrambling
Macro Virus
Targets MS office products
Password Spraying
Cracking user accounts by using list of common passwords from the internet and spraying thousands of accounts
ARP Spoofing
Address that has been duplicated will show as sending traffic from 2 different sources at the same time (1 iP and 2 MACS)
Banner Grabbing
Common information gathering technique that attackers use together information about the target web server using nmap-sV.
Bluesnarfing
Stealing info over Bluetooth
Cloud Hopper
Accesses the target customer profiles with manager service provider (MSP) cloud account, compresses the customer data, and stores them in the MSP. Later, this is used to launch further attacks.
DHCP Starvation
A DOS attack on the DHCP servers where attackers broadcast forged DHCP requests and lease all the DHCP space available in the DHCP scope until server is of no use.
DNS Tunneling
Attacker configures multiple domains pointing to the same host to switch quickly between the domains and avoids detections and bypasses the firewalls.
Directory Traversal
Web server does not properly ignore the ../../ string and instead returns the file listing of a folder higher up in the folder structure of the server.
Hit List Scanning Technique
A method to create a botnet by collecting info about several vulnerable machines to make a list infecting those machines to convert them into bots and then divide the list by assigning half of the list to the new compromised machines.
Idle Scanning
Type of firewall scanning technique where attackers make use of a zombie system that has low network activity and frag id numbers.
Out of Band SQLI
SQL inject that leverages a database server’s ability to make DNS requests to pass data to an attacker
Quid Pro Quo
Something for something “attackers call random numbers claiming to be from IT support, baiting to get the end user to exchange info.