Domain 3: Attacks & Exploits Flashcards
What is social engineering?
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
What is one of the most well known social engineering methods?
Phishing is this
What is a smish?
A phishing text
What is vishing?
Phishing that occurs over a telephone
What is SMS phishing?
This is Short Message service phishing that occurs over text message.
What is elicitation?
This usually uses a series of questions to get employees to tell you valuable or sensitive information. All about getting someone to provide something for you.
Can you use elicitation with Email?
Yes, this can be used with email. Think of BEC.
What is the definition of Elicitation?
To draw out or bring forth; educe; evoke
Is Interrogation a type of social engineering?
Yes, this, albeit a moral dilemma, is a type of social engineering.
What is impersonation?
Act of pretending someone you aren’t to gain access to locations/systems that you’re not supposed to have access to.
What is USB keydrop?
Loading up a USB with malware, backdoors, keyloggers, and dropping it in say a parking lot in hopes someone at an organization plugs it in.
What are motivates a user to fall for social engineering attacks?
With respect to attacks:
- Motivation
- Urgency
- Social Proof
- Likeability
- Fear
What are some physical security attacks?
- Piggybacking/Tailgating
- Fencing
- Dumpster Diving
- Lock Picking
- Lock Bypass
- Egress Sensor
- Badge Cloning
What does NBNS stand for?
Net Bios Name Service
What is the host name of a system?
Netbios is the host name of a system
What does LLMNR stand for?
Link-local Multicast Name Resolution
What is LLMNR?
This is a protocol based on the DNS packet format allowing both IPv4 & IPv6 hosts to perform name resolution for hosts on the same local link.
Where will you find LLMNR?
You will find this on Windows Vista and newer operating system. Linux also implements a version of this, called system.
When is LLMNR useful as a hacker?
This is helpful when a temporary network is created, such as an ad-hoc wi-fi network.
What is SMB?
Transport protocol used by windows machines; file sharing, printer sharing, remote window services. Linux can run using SAMBA.
What ports allow SMB?
Ports 139 & 445
What well known exploit and well known ransomware utilizes flaws in SMB?
EternalBlue exploit and WannaCry Ransomware both utilize a flaw in this protocol.
How many versions of SNMP exist?
There are three versions of this protocol as of Jan 2020.
Which version of SNMP uses a shared ‘community string’ sent in clear text when set to public?
SNMPv1 uses this when set to public.