Deck D Prt. 2 Flashcards

1
Q

Man In The Middle

A

In Order to mitigate, Man-In-The-Middle (MITM) Attack, Make sure that Legitimate Network Routers are Configured to run Routing Protocols with Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Meet In The Middle Attack

A

Meet In the Middle Attack Is KNOWN Plaintext Attack Used Against DES Which Gives the Result that Encrypting Plaintext With ONE DES Key followed by Encrypting It with a Second DES Key is no more Secure THAN using a Single Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi-Homed Firewall

A

The Minimum Number of Network Connections in a Multihomed Firewall is 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS

A

Is The (Network Intrusion Detection System) Best Applicable for Large Environments Where Critical Assets on the Network need Extra Scrutiny and is Ideal for Observing Sensitive Network Segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nmap -oX Flag

A

In an Nmap Scan the -oX flag outputs the results in XML format to a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nmap Command

A

nmap -sT -O -T0 is the Command that would Result in a Scan of Common Ports with the Least Amount of NOISE in Order to Evade IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nmap Command

A

nmap -T4 -F 10.68.3.10/24 Command allows you to Enumerate all Machines in the IP Address of 10.68.3.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSINT

A

Is the Collection of Potentially Actionable, Overt, & Publicly Available Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCI Compliance

A

Is the Standard Set by the CREDIT CARD Companies. It does not Recommend Rotating Employees handling Credit Card Transactions on a yearly Basis to Different Departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Penetration Test

A

A Penetration Test Actively Exploits Vulnerabilities in the Targeted Infrastructure, while a Vulnerability Scan Does Not Typically Involve Active Explication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Printer Ports

A

Port 515 Is where PRINTERS Listen for Connection, Port 631 is for the IPP i.e Internet Printing Protocol and port 9100 is used for Printing as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RECON

A

Is the Time A Hacker Spends Performing Research to locate the Information about a Company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Acceptance

A

Is a GOOD Strategy if the risk is only 10% and Risk Threshold is 20%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rubber Hose Attack

A

A Rubber Hose Attack Allows Extraction of Cryptographic Secrets through coercion or torture such as beating that person with a rubber hose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rules Of Engagement

A

The Rules Of Engagement Describe the specifics of the Penetration Testing, The Associated Violations, and Essentially protects both the Organization’s Interest and your liabilities as a Tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STARTTLS

A

Is The Name of the Command USED by SMTP Transmit Email OVER TLS

16
Q

ShellShock Bash Vulnerability

A

env x=’(){:;}echo explit’ bash ‘“c ‘~cat/etc/passwd’ is an example of Shellshock Bash Vulnerability in LINUX that will Display Passwd content to the Command Prompt.

17
Q

Social Engineering

A

Is a Low Tech Way of Gaining Unauthorized Access to Systems

18
Q

Tunneling/Stealth/Encrypted Virus

A

Tunnelling Virus is a Virus that Attempts to Intercept Anti-Virus Software before it can detect Malicious Code. A Tunneling Virus Launches itself under anti virus Programs and then works by going to the Operating System’s Interruption Handlers and intercepting them, Thus avoiding Detection. Tunneling Virus Hides from anti Virus Program’s by actively altering and corrupting the chosen service all Interruptions when they are being run.
Stealth Virus is a Very tricky Virus as it changes the code that can be Used to Detect it. Hence, the Detection of Viruses becomes very difficult. Encryption Virus Exists in encrypted form to avoid detection. it Carries a DECRYPTION Algorithm along with it. So the Virus First Decrypts and Then Executes.

19
Q

Two Factor Authenticatoin

A

2FA is a Camera Capturing People Walking (GAIT-Something you Are) Combined with RFID Badges (Something You Have)

20
Q

UDP Port 53

A

UDP Port 53 is DNS is not Available, and Therefor websites will no longer be Accesssible.

21
Q

WHOIS

A

Is a system that consist of a PUBLICLY Available set of Databases that Contain Domain name Registration contact Informatoin

22
Q

Whisker

A

Is the Tool Used to Perform Session Splicing Attacks. Sessions Splicing is an IDS Evasion Technique in Which an Attacker Delivers Data in multiple small Sized PACKETS to the Target Computer, making it very Difficult for and IDS to detect the Attack Signatures. Hydra is a Password

23
Q

Whisker Tool

A

Is A EVASION TOOL for Session Splicing. One Basic Technique is to split the Attack Payload into Multiple Small Packets so that the IDS Must Reassemble the Packet Stream to Detect the Attack. A Simple Way of Splitting Packets is by Fragmenting them. The “Whisker” Evasion TOOL calls Crafting Packets with small Payloads ‘Session Splicing’

24
Q

HTTP-Methods

A

Is THE NMAP Script Engine that will help you detect HTTP Methods (GET, POST, HEAD, PUT, DELTE, TRACE)