Deck A Prt. 1 Flashcards

1
Q

.bash_history

A

Is the file in Linux that stores the passwords and has to be cleaned from time to time to clear the passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARIN Tool

A

An Online tool for ENUMERATION. the hacker gathers the server IP address of the target Organization using WHOIS Footprinting. This Tool can be used to retrieve information such as the network range of the target organization and to identify the network topology and operating system used in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agent Based Scanner

A

Is A type of scanner that ATTACKERS install on the Targe Machine and scan several machines on the same Network to Identify Vulnerabilities to perform further EXPLOITATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Banner Grabbing

A

Is a Common Information gathering technique that attackerss use to gather information about the target web server using the nmap -sV OPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluesnarfing

A

Is Bluetooth Attack in which the attacker is stealing information from a wireless device though Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluto Tool

A

Is used to perform DNS ENUMERATION to gather information about DNS servers and to identify the hosts connected in the Targe Network. This is a popular AUTOMATED tool that is used to retrieve information about DNS Zone Data including DNS domain names, computer names, IP Addresses, DNS records, and network WHOIS Records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Carrier

A

Is a NIST Term for a Telecom Company that provides Internet Connectivity and transports services between the Organization and Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Hopper Attack

A

Is the Attack in which the ATTACKER accesses the target Customer Profiles with their MSP(Managed Service Provider) Cloud account, compress the customer data, and stored them in the MSP. Later they use this piece of information to launch further attacks on the target organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Community Cloud

A

A CLOUD MODEL in which clients can join with a group of users or organizations to share a cloud environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHCP Starvation Attack

A

Is a DoS Attack on the DHCP servers where attackers broadcast forged DHCP requests and lease all the DHCP addresses available in the DHCP scope until the server is not able to issue any more IP Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Tunneling

A

The attacker configures multiple domains pointing to the same host to switch quickly between the domains and avoid detection and bypass the firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital Signature

A

Is a hash of the message Encrypted with senders Private Key. The Sender signs the hash of the message with his Private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Directory Traversal Attack

A

Is the attack in which the Web Serves does not properly ignore the ../ ../ ../ ../ character string and instead returns the file listing of a folder higher up in the folder structured of the server. A DIRECTORY TRAVERSAL (Path Traversal) Attack exploits insufficient Security Validation or Sanitization of user supplied file names, such that characters representing “Traverse to parent directory” are passed through to the operating system file systems API. Directory Climbing, & Backtracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Docker Daemon

A

Is a component within Docker container Framework that can process API requests and handle various Docker objects, such as containers, volumes, images and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Document Root

A

Is a Folder/Directory on a web server that Contains the Web pages visible to the public. (Called DOCROOT) the folder names are often /www/public or /public_html.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Elicitation Technique

A

Is a set of techniques and methods used by Intelligence and cyber intelligence professionals to covertly gather INFORMATION. Essentially an intelligence professional engages in a conversation with the targe and uses Elicitation methods to gather the information they need without the targe realizing that they are being Exploited for Information

17
Q

FTPS

A

A Secure File Transfer Protocol that can Securely Transfer data using Encryption and Digital Certificates Port TCP 990(SSL/TLS)

18
Q

False Positives

A

Are issues discovered by a Vulnerability scan that are not really vulnerabiliteis.

19
Q

HIPPA

A

Is the regulation within the medical community to protect the PHI(Protected Health Information) and personal Medical records

20
Q

Hit List Scanning Technique

A

Is a way to create a Botnet by collecting information about several vulnerable machines to make a list, infect hose machines to convert them into BOTS, and then divide the list by assigning half of the list to the newly compromised machiens

21
Q

Idle Scanning

A

Is a type of Firewall Evasion scanning technique where the ATTACKERS make use of a Zombie system that has low network activity and fragment identification numbers

22
Q

Incident Triage Phase

A

In the INCIDENT RESPONSE, Incident Triage is the phase that is used to located incident details such as the type of attack, its severity, targe, impact, method of propagation, and vulnerabilities exploited

23
Q

Infoga Tool

A

Is an ENUMERATION tool to track the emails of the targe and helps the attacker extract information such as sender identities, mail servers, sender IP Addresses, and sender location from different public sources

24
Q

nmap -D scan

A

is the type of scan where the attacker must scan every port on the server frequently using a set of spoofed sourced IP Addresses (-D=Use A Decoy Cloaking: Send Scans from Spoofed IP Address)

25
Q

Out Of Band SQLi

A

Is a type of SQL injection that leverage a database servers ability to make DNS requests to pass data to an attacker