Chapter 7: System Hacking Flashcards

1
Q

Passive Online Attack techniques (3)

A

1) Packet Sniffing - lookout for PWs from Telnet, FTP, SMTP, rlogin, other vulnerable protocols

//if you use a sniffer w/ out any extra steps, u are limited to a single collision domain aka can only sniff hosts not connected by switch or bridge

//most effective on a NW that employs a hub

2) Man-in-the-middle - while two parties are communicating, a third party inserts itself into the convo & attempts to alter or eavesdrop on the communications.

//to be fully successful, the attacker must be able to sniff traffic from both parties at the same time

//vulnerable protocols –> Telnet & FTP

3) Replay Attack - capture packets using packet sniffer; after the relevant info is extracted, the packet can be placed back on the NW; The intention is to inject the captured info back onto the NW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Online Attack techniques

A

1) Password Guessing - attacker seeks to recover PW by using words from dictionary or by brute-force; usually carried out by SW app;
2) Trojans, Spyware, & Keyloggers - Malware such as Trojans, spyware, & keyloggers can gather info through keyboard sniffing or keylogging;

3) Hash Injection -
1) Compromise a vulnerable workstation
2) When connected, attempt to extract the hashes
from the system for high-value users, such as domain or enterprise admins
3) Use the extracted hash to log on to a server such as a domain controller
4) If the system serves as a domain controller or similar, attempt to extract hashes from the system w/ the intention of exploiting other accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNA

A

Distributed Network Attack:

using botnet to crack or attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LM/NTLM Hashes

A

Windows SAM Hashing method. NTLM replaces LM

Windows XP later do not store LM hash by default, they store a blank or dummy value which cannot be deciphered bc it has no direct coorelation to user’s actual PW; if PW is longer than 14 chars, dummy value is auto used b/c LM hash cannot support longer than 14 chars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Salting

A

PW hashing is strengthened by adding an additional layer of randomness to hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NTLM Authentication & SSP

A

NT Lan Mgr is a protocol for Microsoft products; NTLM v1 and v2 still widely used in environments, but is relatively insecure; this is used where Kerberos is not supported

SSP - Security Support Provider - layered on top of NTLM for additional protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domain Controller

A

responds to security authentication requests (such as logging in, permissions, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process of authentication w/ NTLM protocol

A
  1. (Interactive authentication only) A user accesses a client computer and provides a domain name, user name, and password. The client computes a cryptographic hash of the password and discards the actual password.
  2. The client sends the user name to the server (in plaintext).
  3. The server generates a 16-byte random number, called a challenge or nonce, and sends it to the client.
  4. The client encrypts this challenge with the hash of the user’s password and returns the result to the server. This is called the response.
  5. The server sends the following three items to the domain controller:
    User name
    Challenge sent to the client
    Response received from the client
  6. The domain controller uses the user name to retrieve the hash of the user’s password from the Security Account Manager database. It uses this password hash to encrypt the challenge.
    7 The domain controller compares the encrypted challenge it computed (in step 6) to the response computed by the client (in step 4). If they are identical, authentication is successful.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Kerberos and steps to authenticate service

A

Universal login service

The Kerberos protocol makes use of the following groups of components:

  • Key distribution center (KDC)
  • Authentication server (AS)
  • Ticket-granting server (TGS)

Process:

1) authenticate with AS, receive ticket-granting-ticket (TGT) which expires after a configurable period
2) TGT is presented to TGS (ticket-granting service), which generates another ticket for you to present to the service
3) The service either accepts or rejects the ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Privilege Escalation (2)

A

1) Horizontal Privilege Escalation - attacker attempts to take over rights & privileges of another user who has the same privileges as the current account
2) Vertical Privilege Escalation - attacker gains access to an account & then tries to elevate the privileges of the account or gaining access to a higher-privileged account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ADS

A

ALTERNATE DATA STREAMS (ADS) (only NTFS) - major security issue w/ ADS bc it is nearly a perfect mechanism for hiding data; almost impossible to find; The data can lie and wait until the attacker decides to run it later; allows you to hide files within existing files

Creating an ADS:
type triforce.exe > smoke.doc:triforce.exe //executing this command hides triforce.exe behind the file smoke.doc, then delete original triforce.exe

Retrieve the file:
start smoke.doc:triforce.exe //opens hidden file & executes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dictionary Password Attack

A

password-cracking app has a dictionary file loaded into it, no good for passphrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute Force Password Attack

A

every possible combination of characters is attempted until the correct one is uncovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hybrid Password Attack

A

like Dictionary attack, but words are modified w/ the addition or substitution of special chars or #s (i.e. p@ssw0rd - password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syllable Password Attack

A

combination of brute-force & dictioanry attack, useful when password is not standard word or phrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rule-based Password Attack

A

an advanced attack where the assumption the user has created a PW using info the attacker has knowledge of (i.e. phrases & digits user may tend to use)

17
Q

Salting

A

used in Linux, Unix, BSD, older windows; adding entropy or randomness in order to make sequences or patterns more difficult to detect.