Chapter 5 - 8 Flashcards
SAM Files
Security Accounts Manager File - Windows store credential in SAMs File. C:\windows\system32\config v
LM Authentication
DES
NTLM
DES and MD4 (V2 MD5)
WINDOWS registry
is a collection of all the setting and configurations that make the system run - made up of keys and values
Hacking Steps
Reconnaissance, Scanning , Gaining Access, Maintaining Access, Clearing Tracks
Net view /domain:domainname
Show all systems on a domain
net view \systemname
provide a list of open shares on the system named
net use \target\ipc$ “” /u: ‘’
set up a null sessions
Passive online attack
Sniffing a wire in the hopes of either intercepting a password in clear text or replay attack or a man in the middle attack
Vertical Escalation
When a lower level user executes code at a high privilege level than they should have access to
Horizontal Escalation
Excuting code at the same user
Kerberos
Uses both Symmetric and Asymmetric encryption. technologies to securely transmit passwords and keys across a network. (TGT TGS AS KDC)
Important Keys
HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\RunServiceOnce ( RunServices RunOnce Run)
Attack types
Non- Electronic, Active Online, Passive online , Offline
DLL Hijacking
Replacing legitimate DLL with malicious copies in the application root folder
New Technology File System
NTFS file streaming allows you to hide files virtually behind any other file.
Types of Logs
Application, Security, Systems
Rootkit
Collection of software put in place by an attacker that is designed to obscure system compromise (backdoor)
Type of Rootkits
Hypervisor Level, Hardware, Boot loader level, application Level, Kernel Level and Library Level
IETF
Internet Engineering Task Force - Create engineering documents to help improve the internet
W3C
World Wide Web Consortium - International Community working together to develop web standards