Chapter 5 - 8 Flashcards

1
Q

SAM Files

A

Security Accounts Manager File - Windows store credential in SAMs File. C:\windows\system32\config v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LM Authentication

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NTLM

A

DES and MD4 (V2 MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WINDOWS registry

A

is a collection of all the setting and configurations that make the system run - made up of keys and values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacking Steps

A

Reconnaissance, Scanning , Gaining Access, Maintaining Access, Clearing Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Net view /domain:domainname

A

Show all systems on a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

net view \systemname

A

provide a list of open shares on the system named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

net use \target\ipc$ “” /u: ‘’

A

set up a null sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive online attack

A

Sniffing a wire in the hopes of either intercepting a password in clear text or replay attack or a man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vertical Escalation

A

When a lower level user executes code at a high privilege level than they should have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Horizontal Escalation

A

Excuting code at the same user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos

A

Uses both Symmetric and Asymmetric encryption. technologies to securely transmit passwords and keys across a network. (TGT TGS AS KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Important Keys

A

HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\RunServiceOnce ( RunServices RunOnce Run)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack types

A

Non- Electronic, Active Online, Passive online , Offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLL Hijacking

A

Replacing legitimate DLL with malicious copies in the application root folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

New Technology File System

A

NTFS file streaming allows you to hide files virtually behind any other file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of Logs

A

Application, Security, Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rootkit

A

Collection of software put in place by an attacker that is designed to obscure system compromise (backdoor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Type of Rootkits

A

Hypervisor Level, Hardware, Boot loader level, application Level, Kernel Level and Library Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IETF

A

Internet Engineering Task Force - Create engineering documents to help improve the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

W3C

A

World Wide Web Consortium - International Community working together to develop web standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OWASP

A

Open Web Application Security Project - Focused on improve the security of software

23
Q

Apache configuration

A

http.conf

24
Q

IIS configuration

A

Spawns shells as LOCAL_SYSTEM

25
Q

N-tier architecture

A

Distributes processes across multiple servers - Each tier consists of a single role carried out by one

26
Q

Three Tier Architecture

A

Presentation Tier, Logic Tier and Data Tier

27
Q

HTML entity

A

Way of telling the browser to display certain character it would otherwise look at as a tag or part of the programming itself and

28
Q

HTTP request methods

A

GET, HEAD, POST, PUT, DELETE,TRACE and CONNECT§

29
Q

DNS Amplification

A

Attack manipulating recursive DNS to DoS a target

30
Q

Web 2.0

A

Different method of creating website and applications (dynamic web pages) web 1.0 using static HTML

31
Q

LDAP Injection

A

)(&) after username then any password

32
Q

SOAP Injection

A

Inject malicious queries

33
Q

Buffer Overflow

A

Also known as Smashing the stack is an attempt to write more data into an application prebuilt buffer to overwrite adjacent memory, execute code or crash a system

34
Q

CSRF

A

Cross Site Request Forgery - Get user to execute unwanted actions on a web application on which they are currently authenticated

35
Q

HTTP Response Splitting

A

Adding header response data to an input field so the server splits the response in a couple directions - second header can be controlled and used for malicious reasons

36
Q

802.11i

A

WLAN

37
Q

802.16

A

Global development of broadband wireless metropolitan area network

38
Q

modulation

A

the practice of manipulating properties of a waveform

39
Q

OFDM Wavelength

A

Orthogonal Frequency-Division Multiplexing - Works with several waveforms, simultaneously carrying messages back and forth

40
Q

DSS

A

Direct-sequence spread spectrum - combing all wavelengths into a single purpose

41
Q

Ad hoc mode

A

Wireless systems connect directly to other systems as if a cable were strung between the two

42
Q

Infrastructure mode

A

Uses an access point (AP) to funnel all wireless connections through

43
Q

BSS (Basic Service Area)

A

Single AP and its client is known as a basic service sent

44
Q

ESS

A

As client move from one AP in your subnet to another - dissociated with one AP and (re)associate with another seamlessly

45
Q

Omnidirectional Antenna

A

360 degrees from sourse

46
Q

Directional Antenna

A

Focusses in a specific direction

47
Q

Dipole

A

Two signal towers and work omnidirectional

48
Q

SSID

A

Service set identifier - text word (32 characters or less) that distinguishes wireless networks (part of the header in every packet)

49
Q

WEP

A

Wireless equivalent privacy - 40 bits to 232-bit keys in RC4 encryption algorithm - reuses initialisation vectors

50
Q

WPA

A

Wifi Protected Access (WPA or WPA2) - Uses TKIP 128 - bit key - changes key every 10000 packets

51
Q

WPA2

A

Can tie Extensible Authentication Protocol (EAP) - Uses AES for encryption

52
Q

Untethered

A

Kernel will remain patched

53
Q

Semi-tethered

A

Reboot no longer trains the patched kernel but the software has already been added to the device, there for if admin privileges are required the installed jail breaking tool can be used)

54
Q

tethered

A

Reboot removes all jailbreaking patched and the phone may be stuck in a perpetual loop on start up, requiring a system connection, such as a usb to repair)