EH-01-P1: Introduction Flashcards
1
Q
Types of Hackers
A
Ethical, Unethical, Gray Hats
2
Q
What do Hackers do?
A
- Alter Functionality,
- Take Advantage,
- Security Professionals must remain up-to-date.
3
Q
Hacker Teams
A
- Red Team
- Blue Team
- Purple Team
4
Q
Hacker Attack Maps
A
- Check Point
- Fortinet
- Talos Intelligence
5
Q
Certifications
A
- CEH = Certified Ethical Hacker
- OSCP = Offensive Security Certified Professional
- OSWE = Offensive Security Web Expert
- CISA = Cybersecurity and Infrastructure Security Agency
- CISM = Certified Information Security Manager
- CISSP = Certified Information Systems Security Professional
6
Q
Ethics: Penetration Testers
A
- Principle : Get Permission
- Integrity : Signing Non-disclosure agreements
- Legal Awareness: Laws
- Professionalism : Ethical and Professional Integrity
- Responsibilities: No malicious activity
7
Q
Malware
A
Malicious Software to do:
- Damage
- Spy
- Steal Information
8
Q
Malware Types
A
- Virus : Replicates when executed
- Ransomware : encrypts data until ransom is paid
- Trojan Horse : Malware hidden in legitimate files
- Worm : Self-replicating
- Botnet : Zombie Network for DDoS
9
Q
Cyberattack Cycle
aka
Kill Chain
A
- Reconnaissance: Check for vulnerabilities
- Weaponization: Create payload
- Delivery:
- Exploit : Execute malware
- Command and Control: Gain System access.
10
Q
Famous Cyber Attacks
A
- Stuxnet worm : Iran’s Nuclear Program
- Playstation : SQLi
- WannaCry via EternalBlue(NSA)
11
Q
Unique Zero-Day Vulnerability
A
Newly Discovered vulnerability
12
Q
WannaCry Attack Chain
A
- EternalBlue via SMB
- WannaCry tries to connect to attacker C&C
- Encrypted Personal Files