Ethical Hacking Flashcards

1
Q

Malware

A

Any malicious software. Created to inflict damage, steal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malicious software that needs user to execute it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that spreads copies of itself from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

Encrypts system data and hacker requests cryptocurrency to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan Horse

A

Malicious software that often arrives via email or is pushed to users when
they visit an infected website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

Combination of the words robot and network. Refers to computers on a private network that were infiltrated with malicious software that the attacker uses for nefarious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common Attack Flow

A

Reconnaissance (scan for vulnerabilities)
Weaponization (Generate payload - Deliver)
Exploit and Execute (Run command upon execution)
Command and Control (possible full system access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Scanning

A

Reconnaissance step for mapping the network structure. Identify devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nmap

A

Network mapper/scanning tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fingerprinting

A

Detect services using nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewall & IDS Evasion

A

Proxies, Timing (-T flag), Fragmentation (-f flag), Decoys (-D flag)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Netdiscover

A

Uses ARP…networks without DHCP. Sniffs ARP replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Masscan

A

Performs large scale scans on thousands of IPs in seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zenmap

A

Nmap GUI version. Enables creation of customized profile scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On-Path Attack

A

Man-in-the-Middle Attacks: Eavesdropping on communication
Used to obtain info secretly
Allows control over network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP Poisoning

A

ARP resolves IP addresses to MAC addresses
Layer 2 protocol on LAN
Exploits lack of ARP packet validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Arpspoof

A

Tool used for ARP poisoning attack
Forged packet is sent to numerous times on the network
The victim ARP table is updated with the false entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS Poisoning Process

A

Use ARP poisoning to position the machine in the middle
Configure host file
Capture victim’s DNS request
Redirect the victim to a target IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bettercap

A

Tool for On-Path attacks
Can initiate ARP poisoning and DNS spoofing
Sends false DNS responses to the victim

20
Q

Port Stealing

A

Populating the forwarding table
Uses victim’s MAC address
Works only on LANs

21
Q

SSL Stripping

A

Downgrades HTTPS to HTTP
Provides plain text view of the data

22
Q

John

A

Linux tool for password cracking

23
Q

Crunch

A

Password list generator that forms passwords based on length and charsets
Useful when partial knowledge of the victim has been obtained
Can be used to generate lists of passwords according to templates

24
Q

Cupp

A

Creates a wordlist based on word victims may use
Social engineering on the victim may help the attacker build the list
Victim may use an easy to remember password based on personal information

25
Q

Munge

A

Crates a modified wordlist based on Munge Level
Using a predefined wordlist, Munge helps that attacker build a 1337 list of passwords

26
Q

Hydra

A

Tool/login cracker that supports many remote protocols

It continuously attacks while the server sends and access denied response
-l [user name], -P [path to wordlist],

27
Q

Ncrack

A

Fastest and most reliable tool for remote authentication
Has built-in support for Nmap output formats and other advantages

28
Q

SE

A

Social Engineering
Based on human interaction and behavior
Involves the use of psychological manipulation

29
Q

SE Process

A

Preparation, Deceive to Connect, Winning Information, Cover the Tracks

30
Q

Self-Extracting Archive

A

Fake executable documents can be created using a WinRAR feature called SFX

31
Q

SFX Flow

A

Preparation, Icon Change, Create SFX, Hide Modules, Modify File Name

32
Q

MetaSploit

A

Vulnerability, Payload, Exploit

33
Q

Net.exe Utility

A

Windows software component…done in cmd
Manages users, groups, and services
Can also manage network connections

34
Q

Flow of PE via WinLogon

A

OS: choose suitable OS
Mount: mount live OS
Edit: Override ethc.exe with cmd.exe
CMD: Execute cmd.exe with high-level privileges
PE: Add user, change a password

35
Q

Offline Mitigations of Windows PE

A

BIOS Password
Encrypt the Drive
Physical Access

36
Q

Online Mitigation of Windows PE

A

Principle of Least Privilege, Removing Local Admin Rights, Account Audits, User Account Controls, Applocker, Software, Code, Tokens

37
Q

Burp Suite

A

Software tool used for pen testing web apps

38
Q

Fiddler

A

Web debugging proxy that enables HTTP traffic examination for development

39
Q

OWASP Zap

A

Combined Zap’s pen testing project with OWASP projects for a complete solution

40
Q

JavaScript

A

JS code can be added to HTML pages. Can affect the page’s behavior.

41
Q

XSS

A

Cross Site Scripting-client side
Affects other users by storing code. Exploits vulnerability in web app.

42
Q

Cookies

A

String of letters or numbers that verify, track, and store user information.
XSS attack can acquire a cookie to steal a session.

43
Q

LFI

A

Local File Inclusion
Common in PHP-based websites. Uses the include() function

44
Q

RFI

A

Remote File Inclusion. Accesses remote servers to deliver files

45
Q

Vulnerability Assessments

A

Manual Scans-performed by PT experts to find complicated vulnerabilities
Automated Scans- performed to locate simple and more obvious bugs