Chapter 5 - Attacking a System (System Hacking) Flashcards

1
Q

Kerberos Terms

Key Distribution Center (KDC)
Authentication Service (AS)
Ticket Granting Service (TGS)
Ticket Granting Ticket (TGT)

A

KDC holds the AS and TGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Windows Kerberos Exchange Process

Client asks KDC for a ticket in cleartext

server responds with secret key which is hashed by the password copy on the server. This is the TGT

if client can decrypt message (it should) the TGT is sent back to server requesting a TGS service ticket

server responds with service ticket, client allowed to log on

A

note that the password itself is never sent

Only thing sent is a hash value of the password, encrypted with a secret key known only by both parties and good for only that session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pass the hash attack overview

Potentially use it to create a ‘golden ticket’ - a kerberos TGT that you present to the TGS and get domain access

A

steal hashes from users already connected to your target server

use a tool like mimikatz to copy and paste hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows registry definition

Registry Keys

Registry Value

A

registry is a ‘database of configuration databases’ per MS

keys - location pointers like a folder in the file structure

values - defines the setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Registry Values

REG_SZ
REG_EXPAND_SZ
REG_BINARY
REG_DWORD
REG_LINK
REG_MULTI_SZ
A
REG_SZ - character string
REG_EXPAND_SZ - expandable string value
REG_BINARY - binary value
REG_DWORD - 32 bit unsigned integer
REG_LINK - symbolic link to another key
REG_MULTI_SZ - multistring value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Linux file structure

/
/bin
/dev
/etc
/home
/mnt
/sbin
/usr
A

/ - root director
/bin - basic Linux commands (~system32 folder)
/dev - pointers to storage and IO systems you mount
/etc - admin files and passwords, incl password and shadow files

/home - user home directories
/mnt - access locations that have been mounted
/sbin - system binaries, more admin commands most of the routines (daemons) linux runs

/usr - holds all info, commands, files unique to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linux commands

adduser
cat
cp
ifconfig
kill
ls
man
passwd
ps
rm
su
A
adduser - adds user
cat - displays contents of file
cp - copies
ifconfig - shows network configuration info for NIC
kill - kills running process
ls - displays contents of folder
man - displays manual page
passwd - changes password
ps - process status command. Use -ef options to show all process running on system

rm - removes files. rm -r is recursive
su - lets you perform functions as other user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exam Tip for Linux commands

adding an ampersand (&) after process name does what?

for the process to remain after user log out, do what?

A

Ampersand after a process name indicates that process should run in the background

For the process to stay persistent, use the ‘nohup’ command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

chmod parameters

read - 4
write - 2
execute -1

A

chmod 464 sets permissions to r–rw-r–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

chmod parameters

read - 4
write - 2
execute - 1

A

chmod 464 sets permissions to r–rw-r–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

chmod 777

chmod 464

A

opens file up for everyone full access

user gets read, group gets rw, everyone gets read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

identify the portions of this line from the /etc/passwd file

matt:x:500:500:Matt:/home/mat:/bin/csh

A
matt - username
x - password (indicating use of the shadow file)
500 - UID
500 - GID
Matt - full name of user
/home/mat - user home directory
/bin/csh - login shell
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

difference between passwd file and shadow file

A

passwd displays password in clear text (if it’s used, it never is today)

shadow file stores and displays encrypted passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometric measurement factors

false rejection rate (FRR)

false acceptance rate (FAR)

crossover error rate (CER)

A

FRR - percent of time a biometric reader denies access to legitimate user

FAR - percent of unauthorized access given by the system

CER - FRR and FAR are charted together and where they intersect is the Crossover Error Rate. CER is the ranking measurement of biometric systems (the lower the better(

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active Online Attack

note that ECC says phishing belongs here, even though it doesn’t seem to deal with password cracking

A

done by directly communicating with target machine

include dictionary, brute force attacks, hash injections, phishing, Trojans, spyware, key loggers, password guessing

take much longer time and easier to detect than passive attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

exam time for net use commands

net use z:\somecomputer\fileshare /persistent: yes [no]

A

remember the /persistent:yes or no switch to make it stick after reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Passive online attack

A

sniffing to intercept a password, attempt a replay attack or MITM attack

capture clear text
arp spoof or poison
use ettercap to MITM or SSL proxy

18
Q

Offline Attacks

A

hacker steals copy of password file and cracks it on a separate system

19
Q

Dictionary attack

A

easiest and fastest password cracking attack. Uses list of passwords that’s hashed in the same way as the password and compared to each other

20
Q

Hybrid Attack

A

takes words from a list like a dictionary attack but can substitute numbers and symbols for alphabetical characters

21
Q

Brute Force Attack

A

every conceivable combination of letters, numbers, special characters is compared against hash to find a match

best option for complex passwords, but slow

22
Q

Exam Tip for cracking passwords

ECC loves rainbow tables.

A

Rainbow tables are huge collections of hashes of every password imaginable. Attacker compares stolen hash to table and gets password.

Today GPU systems can brute force quickly so rainbow tables aren’t as useful as before

can use rtgen and winrtgen to make your own

23
Q

Exam tip definitions

Vertical Privilege Escalation

Horizontal Privilege Escalation

A

Vertical Privilege Escalation
user executes code at a higher privilege level than they should have access to

Horizontal Privilege Escalation
not really escalation.
user executes code at same user level but from location that should be protected from access

24
Q

4 Ways to Escalate Privileges

A

crack password of root account (ECC says this should be primary aim)

Utilize vulnerability found in OS or application that gives access as privileged user. ie 2009 Java or Adobe exploits

Use a tools that provides the access you want. Metasploit

Ask user to run a program for you

25
Q

4 Ways to Escalate Privileges

A

crack password of root account (ECC says this should be primary aim)

Utilize vulnerability found in OS or application that gives access as privileged user. ie 2009 Java or Adobe exploits

Use a tools that provides the access you want. Metasploit

Ask user to run a program for you. Social engineering, phishing, MS Office macro to someone on unpatched system, etc.

26
Q

Executing Applications after escalating privileges

A

ECC refers to this step as “owning” a system

Includes most everything you can think of: key loggers,, spyware, backdoors, crackers, etc.

The idea is to do what you need now that you have the privileges

27
Q

Caveats about ethical hacking

A

Your goal is success, no matter how it comes.

Don’t get caught up in the step-by-step processes

28
Q

Tools to know for this stage of executing remote applications

Remote EXEC (isdecisions.com)
PDQ Deploy (adminarsenal.com)
DameWare Remote Support
A

Tools in this phase are designed to deliver and execute applications in a network to remote systems, so administrators can deploy software and patches to their machines

29
Q

Alternate Data Streams

NTFS File Streaming

A

Know for exam

Way to hide files on Windows machines in the form of NTFS file streaming. Available on all versions of Windows, even 10

c:\type c:\naughty.exe > c:\readme.txt:naughty.exe

put the .txt file wherever you want. To run it type
start readme.txt:naughty.exe

or create a link like this
c:\mklink innocent.exe readme.txt:naughty.exe

all forensic tools check for this today. and an executable in a txt file will show up in the task manager as part of the parent

30
Q

Semagram

A

term related to steganography

visual semagram uses everyday object to convey a message. Examples are doodling and the way items are laid out on a desk

text semagram hides a message in text by using things like font, size, type or spacing

31
Q

Windows Application Log

A

holds entries related to applications.

Only entries programmed by developers get in

32
Q

Windows System Log

A

registers system events like drivers failing, startup and shutdown times

33
Q

Windows Security Log

A

records login attempts, access, activities about resources

34
Q

To clean up logs after / during your access

A

edit what is being audited

if possible, disable auditing only on things you’re hitting (failed resource access, failed logins, etc)

visit log and remove items showing your presence and activities

remove security event log showing where you edited the audit log

alternate approach entirely is to try and corrupt the log file when you’re done

35
Q

Tools for cleaning or manipulating log files

A

Administrative tools | Local Security Policy | Local Policies | Audit Policy to change the audit policy

Security Settings | Advanced Audit Policy configuration

WinZapper, elusive, Evidence Eliminator, Auditpol for older systems

36
Q

Tools for cleaning or manipulating log files

A

Administrative tools | Local Security Policy | Local Policies | Audit Policy to change the audit policy

Security Settings | Advanced Audit Policy configuration

WinZapper, elusive, Evidence Eliminator, Auditpol (form old NT Resource Kit) for older systems

37
Q

ECC Definition of rootkit

A

collection of software put in place by attacker that’s designed to obscure system compromise

in practice, it’s software that replaces or substitutes admin utilities and capabilities with versions that obscure malicious activity

Provide backdoors for attacker and include measures to remove and hide evidence of activity

If done correctly, user and security monitors won’t know anything is wrong

38
Q

Rootkits to know for Exam

A

Azazel
Avatar
Necurs
ZeroAccess

39
Q

6 types of Rootkits to know for CEH

Hypervisor level
Hardware (firmware)
Boot loader level
Application level
Kernel level
Library level
A

Hypervisor - modify boot sequence of host system to load a VM as the host OS

Hardware - these hide in HW or firmware

Boot loader - replace boot loader with one controlled by attacker

Application - replace application files with Trojan binaries. Work inside application and use various means to change its behavior, rights, actions, permissions

Kernel - attack boot sectors and kernel level of OS. Replace kernel code with backdoor code

Library - use system-level calls to hide their existence

40
Q

Protection rings

A

concentric, hierarchical rings from kernel out to applications.

Each ring has own fault tolerance and security requirements

ring 0 - kernel
ring 1 - drivers
ring 2 - libraries
ring 3 - user mode

kernel rootlets work at ring 0, application RK’s at ring 3

41
Q

ECC Steps for detecting rootkits

A

run dir /s /b /ah and dir /s /b /a-h on the machine and save results

boot clean CD version and run same commands for same drive.

User WinDiff on both results to see any hidden malware