CH-6 Techniques Used by Hackers Flashcards

1
Q

Forms of Cell phone attacks?

A

■Blue Snarfing: access of information from a Bluetooth device

■Blue Jacking: Uses another Bluetooth device to send unsolicited messages to the target

■Blue Bugging: Similar to Blue Snarfing, Blue Bugging accesses and uses all phone features

■Pod Slurping: Using a device such as an iPod to access private data on a computer the iPod is plugged into

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does CrossSite Scripting (website link w/t script) work?

A
  1. email w/t script link
  2. user clicks link, that loads legit website and executes script
  3. script sends private data to attacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the Download Substitution work?

A

■ Attacker creates a page with seemingly innocuous and desirable programs for download

■Instead of, or in addition to, the intended functionality, the user installs malware

■This is a very common technique for spyware

■Free Video editor Resist the temptation!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the OphCrack Password Cracking Tool work?

A
  1. Download OphCrack , then load it on a USB stick or burn it to CD
  2. Insert into a Windows computer and boot to OphCrack rather than the computer’s OS
  3. It boots as Linux, grabs the Windows password file, and then uses cracking tools to extract passwords
  4. Usernames and passwords are exported to a text file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scan Type Syn and Fin. Describe them.

A

■Syn
–Sends syn (synchronize) requests to the target
–Does not complete the TCP handshake process
–When an open port identified, TCP handshake is reset
–Now recognized by IDSs due to Syn requests being common for DoS attacks

■Fin
–Sends a FIN (or finish) packet to target
–If that port is not listening, no response
–If it is listening an error response is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scan Type: Ping and Connect. Describe it.

A

■Ping
–Sends a single ICMP echo request to a target
–Target responds with an ICMP echo reply
–No response if IP address unused or if ICMP is filtered

■Connect
–Fully connect to the target IP address and port
–Does a complete TCP handshake
–Can be performed using Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some Passive Scanning Resources?

A
■Google
■LinkedIn
■Job listings
■Netcraft.com
■Archive.org
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Penetration Test?

A

A simulated cyberattack on a computer system to evaluate its security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Active Scanning?

A

Sends traffic into the network to query systems and services

Checks running services for known vulnerabilities

Can be detected by security systems or from disrupting services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Blue Team?

A

The defenders during a penetration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Clickjacking?

A

Manipulating a website user’s activity by concealing hyperlinks beneath legitimate clickable content, thereby causing the user to perform actions of which they are unaware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Enumeration?

A

■“Enumeration” is the act of making a list of things, one after another

■Powerful system and network scanning tools

■Uses active scanning to get as much information as possible

■Identify systems on a network

■Identifies services available on a host, including file shares, etc.

Examples include:
–Cain and Abel
–Sid2User
–Cheops (Linux only)
–UserInfo
–UserDump
–DumpSec
–Netcat
–NBTDump
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Nmap?

A

■CLI (Command-line Interface) tool that scans a private network and identifies all IP addresses that are in use

■Scans specific IP addresses to analyze connected devices

■Provides information about device operating systems and open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is OpenVAS?

A

OpenVAS is the scanner component of Greenbone Vulnerability Manager, a software framework of several services and tools offering vulnerability scanning and vulnerability management.

All Greenbone Vulnerability Manager products are free software, and most components are licensed under the GNU General Public License.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Passive Scanning?

A

Manual research conducted about an organization and its systems.

Can include silent analyses of network traffic to identify systems and patterns.

Does not interact or interfere with systems so it generally cannot be detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Phishing?

A

A message that tries to trick a victim into providing private information or taking some other unsafe action

17
Q

What is Reconnaissance?

A

Preliminary survey or research.

18
Q

What is SQL Injection?

A

■ One of the most common attacks

■Requires some knowledge of SQL

■Attacker enters SQL commands insteadof innocuous data into an application

■If the application was not well designed, it could execute the command

19
Q

What Is SQL?

A

■SQL stands for Structured Query Language and is used by Relational Database Management Systems

■Relational databases tables identified each by a name

■You can think of SQL tables as Excel spreadsheets where columns are data types and rows are data/records

■SQL uses commands such as SELECT, UPDATE, DELETE, INSERT.

■Example: SELECT * FROM tblUsers WHERE USERNAME = ‘admin’

20
Q

What is the Red Team?

A

The attackers during a penetration

21
Q

What is Vulnerability Assessment?

A

Identifying, quantifying, and prioritizing the vulnerabilities (weaknesses) in a system.

22
Q

What is Vulnerability Scan?

A

Automated tool used for assessing computers, networks or applications for known weaknesses

23
Q

Windows Attacks. Describe.

A

■Pass the Hash
–Hacker first obtains encrypted username and password hash
–Sends the hash to the login system; no need to decrypt

■Net User Script
–Logs in to system using Guest account
–Creates script in All Users startup to create new admin account
–Next time an admin logs on, the script will execute

■Login as System
–Boot the target system to a USB or DVD based operating system
–Edit boot partition’s magnifier utility with command prompt app