Deck B Prt. 1 Flashcards
3DES
Is A type of SYMMETIC Encryption in which every individual block contains 64 bit Data, and 3 keys are used where each key consists of 56 bits. 3DES is not a very secure algorithm but better than DES
ARP Ping Scan
Is used to Map Firewall rulesets & Distinguish between stateful and stateless firewalls. This Type of Scan Sends ACK Packets to a HOST.
ARP Ping Scan
ARP Packets are sent for discovering all active devices in the IPv4 Range even though the presence of such devices is hidden by restrictive firewalls.
APT
Advanced Persistent Threat is an ADVANCED ATTACK in which the Attacker remains in the network without being detected for a long time and obtains sensitive information over a period of time.
Agent Smith Attack
Is an attack on mobile phones that replaces all the legitimate apps in the smartphone by deceptive Applications that appear Legitimate
Androidmanifest.xml
Is a File in Android that determines that basic Configuration (Specifically Activities, Service, Broadcast Receivers, etc…) in an Android Application.
Banner Grabbing
(nmap -sV) is the special Nmap command that is used to determine the type and version number of the web server in a Banner Grabbing Attack
CVSS Rating
Represents Vulnerability severity Rating. EX: 4.0=Medium, 9.2=Critical, 4.0-6.9=Medium Severity Range, 9-10=Critical Range
Credential Enumerator
Is a Tool like EMOTET which is a self extracting RAR File that hackers can use to retrieve information related to network Resources such as writable share drives, .RAR file composed of a service component and a bypass component. EMOTET Malware infiltrates computers though a network spreader component which consists of several spreader modules.
DNS Tunneling
Is a Type of Firewall bypass Technique in which the attacker embeds malicious Data into the DNS protocol packets that even DNSSEC can not detect. The Attackers successfully inject malware to bypass a firewall and keep the communication with the victims machine and Server.
DROWN Attack
Is A Vulnerability that makes that web server Vulnerable to attacks using less Secure Encryption Such as SSLv2 Because the SSlv2 Server can leak Key information. It is Recommended to use SSLv3
Dragonblood
Is a Set of Vulnerabilities Discovered in the New WPA3 Wireless Encryption
Encryption Virus
Is a Special Type of virus that can mutate its own code and then Cipher itself Multiple times as it Replicates. Encryption Viruses CONSIST of Encrypted Copy of the Virus and Decryption Module. First the Decryption Module Decrypt the Virus body. When virus tries to replicate and infect other files it will again use Encryption using Different Encryption Keys. it is also called POLYMORPHIC Virus
FCC ID Search
Allows the Attacker to gather information Related to the Model of the IoT Device and the Certifications granted to it.
Fileless Malware
Is A memory Based Malware that AntiVirus tools are unable to Discover and IDS/IPS fails to report on any non whitelisted programs.
Gaining Access
Is the Phase of Ethical Hacking in which the Attacker is Infects a System with Malware and uses phishing to gain credentials to a system.
Gobuster tool
Is a Web Server ENUMERATION Tool. the Fastest way to perform Enumeration on a web server using Gobuster Tool is to perform Content ENUMERATION using a wordlist.
Gray Hat Hacker
Is a HACKER who often discovers Zero Day Vulnerability and sends the Owner and email describing the Vulnerability and also informs the vendor of the Vulnerability.
Honey Trap Attack
Is an attack in which the Social Engineer Pretends to be romantically or Sexually Interested in the Victim, then fakes an online relationship and gathers Sensitive information through that relationship. This Attack is like Confidences/Romance Fraud Attacks.
Hootsuite Tool
Is a Social Media Management tool in which the hacker Conducts a LOCATION Search to Detect their GEOLOCATION and Gathers information about the victim from social media to perform other sophisticated Attacks
JXplorer Tool
Is an AUTOMATED Tool that hackers used to Anonymously Query the LDAP Service for Sensitive Information such as Usernames, Addresses, Departmental Details, and Server Names.
KRACK Attack
Is Where an adversary Tricks a victim into reinstalling an already in -use key. this is achieved by manipulating and replaying Cryptographic Handshake messages. This is a replay Attack(a type of exploitable flaw) on the Wi-Fi Protected Access Protocol that secures Wi-Fi connections. The Security Protocol Protecting many Wi=Fi Devices can essentially be bypassed, potentially allowing an Attacker to Intercept sent and Received DATA
KERNEL Rootkits
It Hides Undetached in the core components of the Operating System. They are Installed in Ring Zero, prior to AntiMalway Software being installed in Ring 3. RING 3 Apps can not inspect Ring 0 due to lack of the appropriate Privilege for Ring 3
NSTX Tool
Port 53 is used for NSTX Tool for BYPASSING the Firewalls Using DNS Tunneling