Deck F Prt. 1 Flashcards
ARP Spoofing
Is a TYPE of Attack in which an Attacker ends False ARP (Address Resolution Protocol) Messages over a LAN (Local Area Network)
Audit Feature
The First Step that The Company Should Take Before Enabling the Audit Feature is to Determine the Impact of Enabling the Audit Feature.
BetterCAP
Is a Sniffing Tool to Send Fake ARP Messages over the Target Network to Link the MAC Address with the Target Systems IP Address. The Hacker Receives Messages Directed to the Victims MAC Address and then can use the same Tool to Intercept, Steal, Modify, and Block Sensitive Communication to the Target System. It is Used to Capture the Data of the Victim and BetterCAP is a Powerful Tool used to Perform Various MITM (Man In The Middle) Attacks on a network, Manipulate HTTP, HTTPS, & TCP Traffic in Realtime, Sniff for Credentials etc.
Btlejack Attack
The btlejack -f 0x9c68fd30 -t -m ox1fffffffff IS A BlteJacking Command USED by Hackers to Hijack the Bluetooth Connections. This attack allows the Hacker to Hijack, Read, and Export Sensitive Information Shared between connected devices over Bluetooth Wireless
Cloudborne Attack
Is a Vulnerability in a Bare Metal Cloud Server that can Enable Hackers to implant Malicious Backdoors in its Firmware. It Also Allows them to Identify Backdoor that Can Persist even if the server is reallocated to new clients or businesses that use it as an IaaS. Organizations deploying Critical high Value Apps on bare Metal Servers through Infrastructure as a Service (IaaS) Offering consider it the best alternative to buying their own hardware because this allows for easy and quick scaling of cloud based Applications without the need of sharing the Hardware with other Users.
Code Injection
Is a Vulnerability that allows Hackers to GAIN Unauthorized Access to API Objects and perform actions such as View, Update, and Delete Sensitive Data of the Company.
Cross Site Scripting (XSS)
Is the WEB Application Attack where the Attackers Exploit Vulnerabilities in Dynamically Generated Web Pages to Inject Client Side Script Into Web Pages Viewed By Other Users.
Cyber Kill Chain
The 7 Stages/Phases Include: RW DEICE= Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control (C2), & Exfiltration (Action on Objectives). An Example of the 3rd Step Delivery in a Cyber Kill Chain is when an Intruder Sends a Malicious attachment via Email to a target.
DDoS Attack
Distributed Denial of Service (DDoS) Attack is carried out by Mirai Malware which targets IoT Devices and uses Compromised hosts to propagate and Create botnets
DNS Cache Snooping
Is an enumeration Technique in which the Pen Testers Queries the DNS Server for a Specific Cached DNS Record. Further, by using this cached record, he determines the sites recently visited by the Organization’s User. DNS Cache Snooping is when someone queries a DNS Server in order to find out (SNOOP) if the DNS Server has a specific DNS record cached, and thereby deduce if the DNS Server’s Owner (or its users) have Recently visited a specific site.
Docker
Is an Open Source Container Technology that Assists with Developing, Packaging, and Running Applications; further, the technology provides PaaS Through OS Level Virtualization, Delivers Containerized software packages, and promotes fast software delivery. Docker is a Set of PaaS (Platform as a Service) products that use OS Level virtualization to deliver Software in Packages called Containers. Containers are isolated from one another and bundle their won software, Libraries and configuration files.
Enumeration
Allows Attackers to draw a map or outline the Target Organization network Infrastructure to know about the Actual Environment that they are going to Hack. Enumeration is defined as the process of extracting usernames, machine names, network Resources, Shares and services from a system.
External Assessment
External Assessment Allows the Hacker to Examine the Network from a hackers perspective to identify Exploits and vulnerabilities accessible to the outside world by using Devices such as Firewalls, Routers, and Servers. It also permits the Threat of Network Security Attacks and Determine the Level of Security of the Corporate Network.
Flowmon
Is an OT (Operational Technology) Tool that protects the organization critical infrastructure and industrial Networks Against Security Incidents such as Cyber Espionage, Zero Day Attacks, and Malware.
GNU Wget Utility
Allows you to Download all the contents of the Web Page Locally for further Examination with Wget 10.10.90.10 Against a Web Server. GNU Wget is Free utility for non Interactive Download of files from the Web. It Supports HTTP, HTTPS, FTP Protocols, as well as retrieval through HTTP Proxies, this Allows you to start a Retrieval and Disconnect from the System, letting Wget Finish the Work.