Domain 3: Attacks & Exploits Flashcards
What is social engineering?
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
What is one of the most well known social engineering methods?
Phishing is this
What is a smish?
A phishing text
What is vishing?
Phishing that occurs over a telephone
What is SMS phishing?
This is Short Message service phishing that occurs over text message.
What is elicitation?
This usually uses a series of questions to get employees to tell you valuable or sensitive information. All about getting someone to provide something for you.
Can you use elicitation with Email?
Yes, this can be used with email. Think of BEC.
What is the definition of Elicitation?
To draw out or bring forth; educe; evoke
Is Interrogation a type of social engineering?
Yes, this, albeit a moral dilemma, is a type of social engineering.
What is impersonation?
Act of pretending someone you aren’t to gain access to locations/systems that you’re not supposed to have access to.
What is USB keydrop?
Loading up a USB with malware, backdoors, keyloggers, and dropping it in say a parking lot in hopes someone at an organization plugs it in.
What are motivates a user to fall for social engineering attacks?
With respect to attacks:
- Motivation
- Urgency
- Social Proof
- Likeability
- Fear
What are some physical security attacks?
- Piggybacking/Tailgating
- Fencing
- Dumpster Diving
- Lock Picking
- Lock Bypass
- Egress Sensor
- Badge Cloning
What does NBNS stand for?
Net Bios Name Service
What is the host name of a system?
Netbios is the host name of a system
What does LLMNR stand for?
Link-local Multicast Name Resolution
What is LLMNR?
This is a protocol based on the DNS packet format allowing both IPv4 & IPv6 hosts to perform name resolution for hosts on the same local link.
Where will you find LLMNR?
You will find this on Windows Vista and newer operating system. Linux also implements a version of this, called system.
When is LLMNR useful as a hacker?
This is helpful when a temporary network is created, such as an ad-hoc wi-fi network.
What is SMB?
Transport protocol used by windows machines; file sharing, printer sharing, remote window services. Linux can run using SAMBA.
What ports allow SMB?
Ports 139 & 445
What well known exploit and well known ransomware utilizes flaws in SMB?
EternalBlue exploit and WannaCry Ransomware both utilize a flaw in this protocol.
How many versions of SNMP exist?
There are three versions of this protocol as of Jan 2020.
Which version of SNMP uses a shared ‘community string’ sent in clear text when set to public?
SNMPv1 uses this when set to public.
Does SNMPv1 use port security?
Yes, this version of SNMP uses port security
In SNMPv1, What is the community string valid for?
In this protocol version, the community string is valid for EVERY node on the network.
What is the internet standard for electronic mail transmissions?
This is SMTP
What can you focus on when attacking SMTP protocol?
There are areas of attacks for this protocol:
- Direct Exploits of the protocol
- Using open relays
- Using local relays
- Phishing Attacks
- SPAM
What used to be the internet standard for file sharing?
This was File Transfer Protocol
What is the problem with FTP?
This is an insecure protocol that sends data and authentication in cleartext over the network
What is pass the hash?
This is an attack against the NT Lan Manager. Attacker steals a hashed user credential and resuses it in the windows authentication system to create a new authenticated system.
What are some of the ways you can conduct a man-in-the-middle attack?
These are methods used to conduct this type of attack:
- ARP spoofing
- Replay
- Relay
- SSL Stripping
- Downgrade
What is ARP Spoofing?
This is when an attacker sends a falsified ARP message over a local network. This results in the Attackers MAC address being associated with the IP of valid computer.
What is replay? What would be an example?
When valid data is captured by the attacker and then repeated or delayed. An example would be an attacker capturing a 3 way wireless network handshake and then replaying it to gain unauthorized access to that network.
What is relay?
This type of attack is when the attacker is able to become the man-in-the-middle and acts as the middle man in a communication session.
What is SSL Stripping?
This is an attack where a websites encryption is tricked into presenting the user with an HTTP connection instead of an HTTPS connection.
What is a downgrade attack? What would be an example?
This is an attack that attempts to have a client or server abandon a higher security mode to use a lower security mode. This attack would cause a session to use SSL 2.0 over TLS 1.2, despite TLS being more secure.
What is a Denial of Service called during a pen test? Do we actually do them during a pen test?
This is called a stress test during a pen test. No, we never actually go through with a denial of service attack during a pentest.
What is a NAC bypass?
This occurs when an attacker spoofs a MAC address of a VOIP device. This is because VOIP devices are granted exceptions (MACs often whitelisted).
Do VOIP Devices support 802.1x?
No, these devices do not support 802.1x.
What is VLAN hopping?
This where you attack a host on a different VLAN to gain access. Double Tagging the VLAN in 802.1Q. By double tagging the switch will pull off external VLAN and put you into new VLAN.
What is switch spoofing?
Auto negotiation with a switch by setting your device to act as a switch. Switches get copies of all VLAN traffic and separate based off tags.