Ethical Hacking Flashcards

1
Q

What is the Computer Misuse Act?

A

It states that unethical hacking is against the law which includes unauthorized access to computer material, intent to commit or facilitate a crime, or modification of computer material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the key point of the Computer Misuse Act?

A

Unauthorized is the keyword.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of hackers?

A
  • Whitehat: authorized to conduct hacking, uses skills to help, hack as a job to secure system and provide insights.
  • Blackhat: hack without authorization, uses skills to steal, damage and destroy for personal gain.
  • Greyhat: sometimes good, sometimes bad - methods may cross legal and ethical boundaries, transfers knowledge to system owners or other blackhats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is leetspeak?

A

For coded communication, avoid detection by search engine, creates stronger password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of pen testing?

A

Blackbox & Whitebox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is black box pentesting?

A
  • Hackers attack covertly.
  • No prior knowledge of system.
  • Employees are tested.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is white box pentesting?

A
  • Aims to be thorough
  • All aspects of system is known, attacks are not covert.
  • Detailed information about target is known.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the typical pentesting activities?

A
  • Reconaissance
  • Scanning / Enumeration
  • Exploitation / Gaining Access
  • Post-Exploit / Maintaining Access
  • Covering Tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some tools for reconnaissance?

A
  • Google dorks
  • WHOIS Lookup
  • DNS Lookup
  • HTTrack
  • Tracert
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some tools for scanning?

A
  • Pings
  • Port Scanning (Zenmap)
  • Nmap Scripting Engine
  • Test default passwords on remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some tools for exploiting?

A
  • Cain & Abel
  • Wireshark
  • Metasploit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some tools for maintaining access?

A
  • Backdoors (Remote Administration Tools)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What to do to cover tracks?

A
  • Hide payload files
  • Delete logs
  • Install rootkits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a pen test report?

A

Contains:

  • Pentest scope & objective
  • Records of findings
  • Specific advice on how to close vulns
  • Steps to be followed

delivered directly to an officer of the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly