Ethical Hacking 5 Flashcards

1
Q

What does the NetBIOS Auditing Tool send to a target system to get the NetBIOS computer name?

A

UDP query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After compromising a server, you wish to hide the exploit file exploit.exe in your present working directory. How can you hide the file using the ATTRIB command?

A

Attrib +s +h exploit.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of attack is a combination of both the brute force attack and the dictionary attack?

A

syllable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What tool can execute processes on remote Windows system?

A

PsExec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which password cracking tool creates tables of all possible pairs of plaintext and ciphertext?

A

RainbowCrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two methods are available for disabling the use of LM hashes on a Windows system?

A

Implement the NoLMHash Policy via Group Policy.

Add the NoLMHash key to HKLM\SYSTEM\CurrentControlSet\Control\Lsa in the registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have gained temporary access to a remote Windows NT server you are auditing, and need to quickly copy the password file. Where is this file located>

A

%SYSTEMROOT%\system32\config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What password cracking utility will crack both UNIX and Windows NT passwords and supports several common hash types found on both of these systems?

A

John The Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker can gain repeated, unregulated, and undetected access to a compromised system by installing a backdoor process, which is the primary purpose of which type of attack?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What statement regarding hardware keystroke loggers is not accurate?

A

Hardware keystroke loggers can interact with the attached system to send data over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Windows utility randomly generates the key used to encrypt password hashes in the SAM database?

A

Syskey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication process through the use of a secure channel for logon purposes?

A

NTLMv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are attempting to automate the process of hardening workstations from attacks network wide. What tool can you use that will display program execution on multiple remote computers simultaneously?

A

Alchemy Remote Executor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of password attack involves a third party intercepting the communication between the two parties?

A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two general countermeasures for preventing privilege escalation?

A

Restrict interactive logons and access to system programs that are not required by users.

Performing auditing of events such as account logons, privilege use, and system events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A compromised server has been placed under your control, and your client has asked that you determine how it was compromised. After utilizing a LiveCD environment to compare file hashes to a known clean installation, you notice a file named msdirectx.sys in the System32 folder that looks out of place. From the presence of this file, what can you determine has happened?

A

The Fu rootkit is installed on the server.

17
Q

What are two methods that might be used by a rootkit to avoid detection by an administrator?

A

The rootkit may disable auditing and event logs.

The rootkit may modify execution paths or system binaries.

18
Q

What method is typically utilized to hide data within an image?

A

Least-significant bit insertion

19
Q

A client has asked you to implement software keyloggers countermeasures. They have requested that you use a utility that does not require hard disk or memory scanning. What utility should you utilize?

A

Advanced Anti Keylogger

20
Q

Which tool tracks any LAN activity, giving the most detailed information on what users did on the System?

A

Activity Monitor