Ethical Hacking 5 Flashcards
What does the NetBIOS Auditing Tool send to a target system to get the NetBIOS computer name?
UDP query
After compromising a server, you wish to hide the exploit file exploit.exe in your present working directory. How can you hide the file using the ATTRIB command?
Attrib +s +h exploit.exe
Which type of attack is a combination of both the brute force attack and the dictionary attack?
syllable
What tool can execute processes on remote Windows system?
PsExec
Which password cracking tool creates tables of all possible pairs of plaintext and ciphertext?
RainbowCrack
What two methods are available for disabling the use of LM hashes on a Windows system?
Implement the NoLMHash Policy via Group Policy.
Add the NoLMHash key to HKLM\SYSTEM\CurrentControlSet\Control\Lsa in the registry.
You have gained temporary access to a remote Windows NT server you are auditing, and need to quickly copy the password file. Where is this file located>
%SYSTEMROOT%\system32\config
What password cracking utility will crack both UNIX and Windows NT passwords and supports several common hash types found on both of these systems?
John The Ripper
An attacker can gain repeated, unregulated, and undetected access to a compromised system by installing a backdoor process, which is the primary purpose of which type of attack?
Rootkit
What statement regarding hardware keystroke loggers is not accurate?
Hardware keystroke loggers can interact with the attached system to send data over the network.
Which Windows utility randomly generates the key used to encrypt password hashes in the SAM database?
Syskey
For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication process through the use of a secure channel for logon purposes?
NTLMv2
You are attempting to automate the process of hardening workstations from attacks network wide. What tool can you use that will display program execution on multiple remote computers simultaneously?
Alchemy Remote Executor
Which type of password attack involves a third party intercepting the communication between the two parties?
Man-in-the-Middle
What are two general countermeasures for preventing privilege escalation?
Restrict interactive logons and access to system programs that are not required by users.
Performing auditing of events such as account logons, privilege use, and system events.