Deck E Prt. 1 Flashcards

1
Q

Blind SQL Injection

A

Does NOT Provide any error Message. It is difficult to exploit as it Returns INFORMATION when the Application is given SQL Payloads that Elicit a True or False Response from the Server. By Observing the Response, An Attacker Can Extract Sensitive Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluetooth Attacks

A

Various Types of Bluetooth Attacks INCLUDE Bluesmacking, Bluejacking & BlueSnarfing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Burp Suite

A

Is a WEB Application Security Tool that has a Feature of intercepting Proxy that can be USED to Inspect and Modify the Traffic Between the Browser and Target Application. This Tool Can also Perform Customized attacks and can be used to TEST the Randomness of session Tokens. Burp Suite is an Integrated platform for performing Security Testing of Web Applicatoins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAST-128

A

Is an Encryption Algorithm USED to Encrypt Email messages. It is a Symmetric Key Block Cipher having a Classical 12 or 16 Round Feistel Network with a Block Size of 64 bits for Encryption, which includes large 8 32 Bit S Boxes (S1, S2, S3, S4) based on bent functions, Modular addition and subtraction, key dependent rotation, and XOR Operations. this Cipher also uses a masking Key Km1 and a Rotation Key Kr1 for Performing its functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CHNTPW Tool

A

Is the Linux Based Tool that can change any Use Password or activate disabled Windows Accounts. CHNTPW is a Software Utility for Resetting or Blanking Local Passwords used by Windows NT, 2000, XP, Vista 7, 8, 8.1, 10. It does this by editing the SAM Database where Windows Stores Password Hashes. It is a Utility to overwrite Passwords of Windows Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CeWL

A

Is an Automated Tool to Gather a list of words from the Target Website to further perform a Brute Force Attack on the previously Gathered Email Addresses. It is a custom Word List Generator tool for Password Cracking. CeWL is a Ruby App Which spiders a given URL to a Specified Depth, Optionally Following external Links, and returns a list of Words which can then be used for Password Crackers Such as John The Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Carrier

A

Provides Connectivity and transport services to cloud consumers. It is an Intermediary that Provides connectivity and transport of cloud services from cloud Providers to Cloud Consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Based Detection

A

Technique is used in Antivirus Software that Identifies Malware by Collecting Data from Multiple protected Systems and instead of Analyzing files locally, it Analyzes the Files on the Cloud Providers Environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNSSEC

A

Is a Set of Extensions to DNS That provide the Origin authentication of DNS Data to DNS Clients (Resolvers) so as to reduce the threat of DNS Poisoning, Spoofing, and Similar Types of Attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Signature

A

Can Not be MOVED from one SIGNED Document to Another because it is the hash of the Original DOCUMENT Encrypted with the Private Key of the Signing Party. It Provides INTEGRITY, Authentication, & Non Repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Downgrade Security Attack

A

Targets WPA3 Transition Mode, Where a Network can Simultaneously Support WPA2 & WPA3 for backward compatibility. If a client and AP (Access Point) both support WPA2 & WPA3, an adversary can set up a rogue AP that only supports WPA2. This causes the client (I.E Victim) to Connect using WPA2 4 way Handshake. The Attacker installs a Rogue Access Point with only WPA2 Compatibility in the Vicinity and forces the victim to go Through the WPA2 to get Connected. After the Connection is Established, the Attacker uses Automated tools to crack WPA2 Encrypted Messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Droidsheep

A

Is an Android App that can be Used for Testing Network Security. But it can also be used to Hack Messengers and other Wi-Fi Networks. In Fact, Droidsheep is Actually Widely used for this PURPOSE by a breed of Hackers. This can be done by the App by Using Sessions. Droidsheep Application Hacks the Session Key which is used between Both Sides of a Connection and Hence can Hack into any Messengers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evilginx

A

Is Used to Create Spoofed Email Messages to send Fake Emails Containing Deceptive Links to Victims Social Media Page to entice the Victim to click on those malicious Links. Instead of serving templates of sign in pages lookalikes, Evilginx becomes a RELAY Between the real website and the phished User. Phished User interacts with the real Website, while Evilginx Captures all the Data Being transmitted between the Two Parties. Evilginx, being the man in the middle, Captures not only Usernames and Passwords but also Captures Authentication Tokens Sent As Cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewalking

A

Is the way to Decide how to packet will move from an Untrusted Outside HOST to a Protected Host inside behind a Firewall, Which Permits the Hacker to Determine which ports are open and if the Packets can pass through the Packet Filtering of the Firewall. Firewalking is the Method of Determining the movement of a DATA Packet form an Untrusted External Hosts to a Protected Internal Hosts Through a Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewall

A

Firewall Checks Transport Layer port Numbers and Application Layer Headers to Prevent particular PORTS and Applications from Getting Packets into an Organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Footprinting

A

Is The Phase in Ethical Hacking During which the Attacker is Surfing the Internet looking for Information about a Particular Company. Footprinting is an Ethical Hacking Technique used to Gather as Much DATA as possible about a specific Targeted Computer System, an Infrastructure and networks to Identify opportunities to penetrate them.

17
Q

Getsystem

A

Is Metasploit Post Exploitation Modules that can be used to Escalate privileges on Windows Systems. Metasploit has a Meterpreter Script, Getsystem, that Will use Several Different Technique to Attempt to GAIN System Level Privileges on the remote system. There are also Various other (Local) Exploits that can be used to also Escalate Privileges.

18
Q

Honeyd Honeypots

A

Detecting the Presence of Honeyd Honeypots is a Technique to Detect Honeypots. It Uses a Time Based TCP Finerprinting Method to Validate the Response to a Normal Computer and the Response of a Honeypot to a Manuel SYN Request.

19
Q

Internal Monologue Attack

A

Allows an Attack Similar to Mimikatz without Dumping Memory Area of LSASS Process, Avoiding Antivirus and Windows Credential Guard. The Attacker Targets the Communication Network of an Organization and disables the security Controls of NetNTLMv1 by Modifying the values of LMCompatibility Level, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then Extracts all the non network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks.

20
Q

IoT Seeker

A

Is an Automated Tool to Scan the Target Network for Specific Types of IoT DEVICES & Detect whether they are using the Default, Factory Set Credentials.

21
Q

Key Stretching

A

Enhances the Security of Keys Used for ENCRYPTION & AUTHENTICATION. For Key Stretching, you can input an initial key to an Algorithm that Generated an enhanced Key that is Resistant to Brute Force Attacks. Key Stretching also Improves Security in some Real World Applications where the Key Length has been Constrained by Mimicking a longer Key Length

22
Q

Kube Scheduler

A

Is a Master Component in the Kubernetes Cluster Architecture that Scans Newly Generated pods and Allocates a NODE to them. This Component can also assign Nodes Based on Factors Such as the Overall Resource Requirement, DATA, Locality, Software/Hardware, Policy Restrictions, and Internal Workload Interventions. Kube Scheduler is a Control Plane Component that watches for newly created Pods with no Assigned Node, and Selects a Node for them to Run On.

23
Q

MAC Flooding

A

Attempts To Overflow the Conent Addressable Memory (CAM) Table in An Ethernet Switch

24
Q

Multiple SYN ACK Spoofed Session Flood Attack

A

In this Attack, The Attackers Create a FAKE Session with Multiple SYN and Multiple ACK Packets along with one or more RST or FIN Packets. Attackers can create Forged TCP Sessions by carrying out multiple SYN, ACK, & RST or FIN Packets, Further, This process allows the attacker to execute DDoS Attacks that can exhaust the Network Resources

25
Nmap -D
(nmap -D) Switch helps Evade IDS or Firewalls. This Causes a Decoy Scan to be Performed, which makes it appear to the Remote Host that the Host (s) you Specify as Decoys are scanning the The Target Network Too. The nmap Offers that ability to Fragment that Packets while scanning with the -f option so it can bypass the Packet Inspection of Firewalls.