CEH Notes from Austin Flashcards

1
Q

Cross Site Request Forgery (XSRF)

A

Web browser vulnerability in which the hacker conducts the transaction from the user account without his consent. Clicks malicious link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cross-Site Scripting (XSS)

A

Web application attack where the attackers exploit vulnerability in dynamically generated web pages to inject client-side script into web pages viewed by other users. STEAL COOKIES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS Cache Spooping

A

An enumeration technique in which theh hacker queries the DNS server for a specific cached DNS record and determines the sites recently visited by the org users. Determines specific sites visited by user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS Hijacking

A

Type of cyber attach in which DNS searches are manipulated in order to redirect users to malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evil Twin

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jamming/Scrambling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Macro Virus

A

Targets MS office products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password Spraying

A

Cracking user accounts by using list of common passwords from the internet and spraying thousands of accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP Spoofing

A

Address that has been duplicated will show as sending traffic from 2 different sources at the same time (1 iP and 2 MACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Banner Grabbing

A

Common information gathering technique that attackers use together information about the target web server using nmap-sV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluesnarfing

A

Stealing info over Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Hopper

A

Accesses the target customer profiles with manager service provider (MSP) cloud account, compresses the customer data, and stores them in the MSP. Later, this is used to launch further attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DHCP Starvation

A

A DOS attack on the DHCP servers where attackers broadcast forged DHCP requests and lease all the DHCP space available in the DHCP scope until server is of no use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS Tunneling

A

Attacker configures multiple domains pointing to the same host to switch quickly between the domains and avoids detections and bypasses the firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory Traversal

A

Web server does not properly ignore the ../../ string and instead returns the file listing of a folder higher up in the folder structure of the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hit List Scanning Technique

A

A method to create a botnet by collecting info about several vulnerable machines to make a list infecting those machines to convert them into bots and then divide the list by assigning half of the list to the new compromised machines.

17
Q

Idle Scanning

A

Type of firewall scanning technique where attackers make use of a zombie system that has low network activity and frag id numbers.

18
Q

Out of Band SQLI

A

SQL inject that leverages a database server’s ability to make DNS requests to pass data to an attacker

19
Q

Quid Pro Quo

A

Something for something “attackers call random numbers claiming to be from IT support, baiting to get the end user to exchange info.