Deck B Prt. 1 Flashcards
3DES
Is A type of SYMMETIC Encryption in which every individual block contains 64 bit Data, and 3 keys are used where each key consists of 56 bits. 3DES is not a very secure algorithm but better than DES
ARP Ping Scan
Is used to Map Firewall rulesets & Distinguish between stateful and stateless firewalls. This Type of Scan Sends ACK Packets to a HOST.
ARP Ping Scan
ARP Packets are sent for discovering all active devices in the IPv4 Range even though the presence of such devices is hidden by restrictive firewalls.
APT
Advanced Persistent Threat is an ADVANCED ATTACK in which the Attacker remains in the network without being detected for a long time and obtains sensitive information over a period of time.
Agent Smith Attack
Is an attack on mobile phones that replaces all the legitimate apps in the smartphone by deceptive Applications that appear Legitimate
Androidmanifest.xml
Is a File in Android that determines that basic Configuration (Specifically Activities, Service, Broadcast Receivers, etc…) in an Android Application.
Banner Grabbing
(nmap -sV) is the special Nmap command that is used to determine the type and version number of the web server in a Banner Grabbing Attack
CVSS Rating
Represents Vulnerability severity Rating. EX: 4.0=Medium, 9.2=Critical, 4.0-6.9=Medium Severity Range, 9-10=Critical Range
Credential Enumerator
Is a Tool like EMOTET which is a self extracting RAR File that hackers can use to retrieve information related to network Resources such as writable share drives, .RAR file composed of a service component and a bypass component. EMOTET Malware infiltrates computers though a network spreader component which consists of several spreader modules.
DNS Tunneling
Is a Type of Firewall bypass Technique in which the attacker embeds malicious Data into the DNS protocol packets that even DNSSEC can not detect. The Attackers successfully inject malware to bypass a firewall and keep the communication with the victims machine and Server.
DROWN Attack
Is A Vulnerability that makes that web server Vulnerable to attacks using less Secure Encryption Such as SSLv2 Because the SSlv2 Server can leak Key information. It is Recommended to use SSLv3
Dragonblood
Is a Set of Vulnerabilities Discovered in the New WPA3 Wireless Encryption
Encryption Virus
Is a Special Type of virus that can mutate its own code and then Cipher itself Multiple times as it Replicates. Encryption Viruses CONSIST of Encrypted Copy of the Virus and Decryption Module. First the Decryption Module Decrypt the Virus body. When virus tries to replicate and infect other files it will again use Encryption using Different Encryption Keys. it is also called POLYMORPHIC Virus
FCC ID Search
Allows the Attacker to gather information Related to the Model of the IoT Device and the Certifications granted to it.
Fileless Malware
Is A memory Based Malware that AntiVirus tools are unable to Discover and IDS/IPS fails to report on any non whitelisted programs.