CH-6 Techniques Used by Hackers Flashcards
Forms of Cell phone attacks?
■Blue Snarfing: access of information from a Bluetooth device
■Blue Jacking: Uses another Bluetooth device to send unsolicited messages to the target
■Blue Bugging: Similar to Blue Snarfing, Blue Bugging accesses and uses all phone features
■Pod Slurping: Using a device such as an iPod to access private data on a computer the iPod is plugged into
How does CrossSite Scripting (website link w/t script) work?
- email w/t script link
- user clicks link, that loads legit website and executes script
- script sends private data to attacker
How does the Download Substitution work?
■ Attacker creates a page with seemingly innocuous and desirable programs for download
■Instead of, or in addition to, the intended functionality, the user installs malware
■This is a very common technique for spyware
■Free Video editor Resist the temptation!
How does the OphCrack Password Cracking Tool work?
- Download OphCrack , then load it on a USB stick or burn it to CD
- Insert into a Windows computer and boot to OphCrack rather than the computer’s OS
- It boots as Linux, grabs the Windows password file, and then uses cracking tools to extract passwords
- Usernames and passwords are exported to a text file
Scan Type Syn and Fin. Describe them.
■Syn
–Sends syn (synchronize) requests to the target
–Does not complete the TCP handshake process
–When an open port identified, TCP handshake is reset
–Now recognized by IDSs due to Syn requests being common for DoS attacks
■Fin
–Sends a FIN (or finish) packet to target
–If that port is not listening, no response
–If it is listening an error response is received
Scan Type: Ping and Connect. Describe it.
■Ping
–Sends a single ICMP echo request to a target
–Target responds with an ICMP echo reply
–No response if IP address unused or if ICMP is filtered
■Connect
–Fully connect to the target IP address and port
–Does a complete TCP handshake
–Can be performed using Nmap
What are some Passive Scanning Resources?
■Google ■LinkedIn ■Job listings ■Netcraft.com ■Archive.org
What is a Penetration Test?
A simulated cyberattack on a computer system to evaluate its security.
What is Active Scanning?
Sends traffic into the network to query systems and services
Checks running services for known vulnerabilities
Can be detected by security systems or from disrupting services
What is Blue Team?
The defenders during a penetration.
What is Clickjacking?
Manipulating a website user’s activity by concealing hyperlinks beneath legitimate clickable content, thereby causing the user to perform actions of which they are unaware.
What is Enumeration?
■“Enumeration” is the act of making a list of things, one after another
■Powerful system and network scanning tools
■Uses active scanning to get as much information as possible
■Identify systems on a network
■Identifies services available on a host, including file shares, etc.
Examples include: –Cain and Abel –Sid2User –Cheops (Linux only) –UserInfo –UserDump –DumpSec –Netcat –NBTDump
What is Nmap?
■CLI (Command-line Interface) tool that scans a private network and identifies all IP addresses that are in use
■Scans specific IP addresses to analyze connected devices
■Provides information about device operating systems and open ports
What is OpenVAS?
OpenVAS is the scanner component of Greenbone Vulnerability Manager, a software framework of several services and tools offering vulnerability scanning and vulnerability management.
All Greenbone Vulnerability Manager products are free software, and most components are licensed under the GNU General Public License.
What is Passive Scanning?
Manual research conducted about an organization and its systems.
Can include silent analyses of network traffic to identify systems and patterns.
Does not interact or interfere with systems so it generally cannot be detected