Deck B Prt. 1 Flashcards

1
Q

3DES

A

Is A type of SYMMETIC Encryption in which every individual block contains 64 bit Data, and 3 keys are used where each key consists of 56 bits. 3DES is not a very secure algorithm but better than DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP Ping Scan

A

Is used to Map Firewall rulesets & Distinguish between stateful and stateless firewalls. This Type of Scan Sends ACK Packets to a HOST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP Ping Scan

A

ARP Packets are sent for discovering all active devices in the IPv4 Range even though the presence of such devices is hidden by restrictive firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APT

A

Advanced Persistent Threat is an ADVANCED ATTACK in which the Attacker remains in the network without being detected for a long time and obtains sensitive information over a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Agent Smith Attack

A

Is an attack on mobile phones that replaces all the legitimate apps in the smartphone by deceptive Applications that appear Legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Androidmanifest.xml

A

Is a File in Android that determines that basic Configuration (Specifically Activities, Service, Broadcast Receivers, etc…) in an Android Application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Banner Grabbing

A

(nmap -sV) is the special Nmap command that is used to determine the type and version number of the web server in a Banner Grabbing Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CVSS Rating

A

Represents Vulnerability severity Rating. EX: 4.0=Medium, 9.2=Critical, 4.0-6.9=Medium Severity Range, 9-10=Critical Range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Credential Enumerator

A

Is a Tool like EMOTET which is a self extracting RAR File that hackers can use to retrieve information related to network Resources such as writable share drives, .RAR file composed of a service component and a bypass component. EMOTET Malware infiltrates computers though a network spreader component which consists of several spreader modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS Tunneling

A

Is a Type of Firewall bypass Technique in which the attacker embeds malicious Data into the DNS protocol packets that even DNSSEC can not detect. The Attackers successfully inject malware to bypass a firewall and keep the communication with the victims machine and Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DROWN Attack

A

Is A Vulnerability that makes that web server Vulnerable to attacks using less Secure Encryption Such as SSLv2 Because the SSlv2 Server can leak Key information. It is Recommended to use SSLv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dragonblood

A

Is a Set of Vulnerabilities Discovered in the New WPA3 Wireless Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption Virus

A

Is a Special Type of virus that can mutate its own code and then Cipher itself Multiple times as it Replicates. Encryption Viruses CONSIST of Encrypted Copy of the Virus and Decryption Module. First the Decryption Module Decrypt the Virus body. When virus tries to replicate and infect other files it will again use Encryption using Different Encryption Keys. it is also called POLYMORPHIC Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FCC ID Search

A

Allows the Attacker to gather information Related to the Model of the IoT Device and the Certifications granted to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fileless Malware

A

Is A memory Based Malware that AntiVirus tools are unable to Discover and IDS/IPS fails to report on any non whitelisted programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gaining Access

A

Is the Phase of Ethical Hacking in which the Attacker is Infects a System with Malware and uses phishing to gain credentials to a system.

17
Q

Gobuster tool

A

Is a Web Server ENUMERATION Tool. the Fastest way to perform Enumeration on a web server using Gobuster Tool is to perform Content ENUMERATION using a wordlist.

18
Q

Gray Hat Hacker

A

Is a HACKER who often discovers Zero Day Vulnerability and sends the Owner and email describing the Vulnerability and also informs the vendor of the Vulnerability.

19
Q

Honey Trap Attack

A

Is an attack in which the Social Engineer Pretends to be romantically or Sexually Interested in the Victim, then fakes an online relationship and gathers Sensitive information through that relationship. This Attack is like Confidences/Romance Fraud Attacks.

20
Q

Hootsuite Tool

A

Is a Social Media Management tool in which the hacker Conducts a LOCATION Search to Detect their GEOLOCATION and Gathers information about the victim from social media to perform other sophisticated Attacks

21
Q

JXplorer Tool

A

Is an AUTOMATED Tool that hackers used to Anonymously Query the LDAP Service for Sensitive Information such as Usernames, Addresses, Departmental Details, and Server Names.

22
Q

KRACK Attack

A

Is Where an adversary Tricks a victim into reinstalling an already in -use key. this is achieved by manipulating and replaying Cryptographic Handshake messages. This is a replay Attack(a type of exploitable flaw) on the Wi-Fi Protected Access Protocol that secures Wi-Fi connections. The Security Protocol Protecting many Wi=Fi Devices can essentially be bypassed, potentially allowing an Attacker to Intercept sent and Received DATA

23
Q

KERNEL Rootkits

A

It Hides Undetached in the core components of the Operating System. They are Installed in Ring Zero, prior to AntiMalway Software being installed in Ring 3. RING 3 Apps can not inspect Ring 0 due to lack of the appropriate Privilege for Ring 3

24
Q

NSTX Tool

A

Port 53 is used for NSTX Tool for BYPASSING the Firewalls Using DNS Tunneling

25
Q

NetBIOS Code <03>

A

Is the SUFFIX that is used for Obtaining the messenger service running for the Logged-inuser.NetBIOS 00: Workstation service (Workstation Name), netBIOS 03:Windows Messenger service.NetBIOS20File Service(also called HOST Record)