Deck C Prt. 1 Flashcards
ARP Spoofing Attack
To Identify an ARP Spoofing Attack in Absence of a VPN, you need to check your ARP Table and see if there is one IP Address with two different MAC Addresses. An Address that has been duplicated will show up as sending Traffic from Two Different Sources Simultaneously
Black Box Pen Test
During Test you Attempt to Pass IRC Traffic over port 80 TCP From a compromised web Enabled host. the Traffic gets blocked; however outbound Application Firewall is used for Inspecting outbound Traffic when the HTTP traffic is flowing Unimpeded.
Censys
Is a public Search engine and Data Processing Company. Censys can Detect Specific Vulnerable Devices and networks. It then Creates Statistical Reports on broad usage patterns and trends. Censys can be used as an Information Gathering Tool to Collect Information About the IoT devices connected to a Network, Open p orts and Services
, and the attack surface area. Using this Tool, you can generate statistical Reports on Broad Usage Patterns and Trends.
CA (Certificate Authority)
Is the Service in PKI that will Vouch for the Identity of an Individual or Company
Credentialed Vulnerability Assessment
Is a Detailed Assessment that FINDS the Details of vulnerabilities and compromises through user Directories, Registries, and other system parameters’, Native configuration tables, incorrect Registry or File permissions, and software Configuration errors.
Cross Site Request Forgery (XSRF)
Is a Web Browser Vulnerability in which the Hacker Conducts the Transaction from the User Account without his consent. This happens when the user Inadvertently Clicks on a Malicious link.
Cross Site Scripting (XSS)
Is the web Application Attack where the Attackers Exploit Vulnerabilities in Dynamically Generated Web Pages to Inject Client-Side Script into Web Pages Viewed by other Users. The Hackers Steal the cookies from the victims Machine
DNS Cache Snooping
DHCP Cache Snooping is an Enumeration Technique in which the hacker queries the DNS Server for a Specific Cached DNS Record and Determines the Sites Recently Visited by the Organization’s User. DNS Cache snopping is when someone queries a DNS Server in order to find out (snoop) if the DNS server has a Specific DNS Record Cached, and thereby deduce if the DNS Server Owner (or Its Users) have recently visited a specific site.
DNS Hijacking
Is a Type of Cyber Attack in which DNS Queries are manipulated in order to redirect users to Malicious Sites.
DNS Cache Snooping
Is A Process of Determining if the Specified Resources Address is Present in the DNS Cache Records. It may be useful during the examination of the Network to Determine what software update Resources are used, thus Discovering what software is Installed.
DNSSEC
Can be Used to Mitigate DNS Cache Poisoning. DNSSEC also lowers the threat to you Domain name Server from DNS Cache Poisoning Attacks. Adjusting the TTL of you DNS Caching servers will certainly help with any DNS Cache poisoning issues.
Dark Web Footprinting
Uses a set of Specialized Tools or Search Engines to Encrypt Hackers Browsing Activity and Navigate Anonymously to obtain sensitive/Hidden Information about Official Government or Federal Databases. The Anonymity of the Dark Web Makes it an Attractive Technology for Illegal Purposes.
Evil Twin
Is a Fraudulent Wi-Fi Access point that appears to be Legitimate but is set up to Eavesdrop on Wireless Communications. The Evil Twin is the Wireless LAN Equivalent of the Phishing Scam. In Evil Twin the Attacker Utilizes a Wi-Fi Pineapple to run an access point with a Legitimate Looking SSID for a nearby Business to Capture the Wireless Password.
Five Tier Container Technology Architecture
Consists of 5 TIERS. Tier 1: Developer Machines-Image creation, testing and Accreditation, Tier 2: Testing and Accreditation systems-verification and validation of image contents, signing images and sending them to the registries. Tier 3: Registries- Storing images and disseminating Images to the orchestrators based on requests. Tier 4: Orchestrators- Transforming images into Containers and deploying Container to Hosts. Tier 5: Hosts- Operating and Managing Containers as Instructed by the orchestrator
Gray Hat
is a Class of Hacker that Refers to an Individual who works BOTH Offensively and Defensively at Various Times.