Ethical hacking Flashcards
What are the five phases of ethical hacking?
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks.
What is social engineering in cybersecurity?
The manipulation of individuals into divulging confidential information, often through deception.
What is a phishing attack?
A type of social engineering attack where attackers impersonate legitimate institutions to steal sensitive information.
What is footprinting?
The process of gathering as much information as possible about a target system to find ways to compromise it.
What is a brute-force attack?
An attack where every possible password or key combination is tried until the correct one is found.
What is a backdoor?
A method for bypassing normal authentication to gain unauthorized access to a system.
What is SQL injection?
A code injection technique used to attack data-driven applications by inserting malicious SQL statements.
What is cross-site scripting (XSS)?
An attack where an attacker injects malicious scripts into content from a trusted website, which is then executed by users’ browsers.
What is a denial-of-service (DoS) attack?
An attack aimed at making a system or service unavailable by overwhelming it with traffic or data.
What is privilege escalation?
A technique where an attacker gains elevated access to resources that are normally protected from an application or user.
What is a honeypot in cybersecurity?
A decoy system set up to lure and analyze attacks, helping to improve defenses.
What is malware?
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.