Ethical Hacking Flashcards
Malware
Any malicious software. Created to inflict damage, steal info
Virus
Malicious software that needs user to execute it
Worm
Malware that spreads copies of itself from one computer to another
Ransomware
Encrypts system data and hacker requests cryptocurrency to decrypt it
Trojan Horse
Malicious software that often arrives via email or is pushed to users when
they visit an infected website
Botnet
Combination of the words robot and network. Refers to computers on a private network that were infiltrated with malicious software that the attacker uses for nefarious purposes
Common Attack Flow
Reconnaissance (scan for vulnerabilities)
Weaponization (Generate payload - Deliver)
Exploit and Execute (Run command upon execution)
Command and Control (possible full system access)
Network Scanning
Reconnaissance step for mapping the network structure. Identify devices on a network
Nmap
Network mapper/scanning tool
Fingerprinting
Detect services using nmap
Firewall & IDS Evasion
Proxies, Timing (-T flag), Fragmentation (-f flag), Decoys (-D flag)
Netdiscover
Uses ARP…networks without DHCP. Sniffs ARP replies
Masscan
Performs large scale scans on thousands of IPs in seconds
Zenmap
Nmap GUI version. Enables creation of customized profile scans
On-Path Attack
Man-in-the-Middle Attacks: Eavesdropping on communication
Used to obtain info secretly
Allows control over network traffic
ARP Poisoning
ARP resolves IP addresses to MAC addresses
Layer 2 protocol on LAN
Exploits lack of ARP packet validation
Arpspoof
Tool used for ARP poisoning attack
Forged packet is sent to numerous times on the network
The victim ARP table is updated with the false entry
DNS Poisoning Process
Use ARP poisoning to position the machine in the middle
Configure host file
Capture victim’s DNS request
Redirect the victim to a target IP