Ethical Hacking 7 Flashcards

1
Q

Trojans are known to use specific protocols and ports to communicate. What protocol and port does the Devil Trojan use?

A

TCP 65000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT a true statement about why ICMP Backdoor Trojans are attractive to hackers?

A

Network devices filter the contents of ICMP_ECHO traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which tool used by trojan creators is run with the user’s IP address after starting a Netcat listener on the user’s machine at port 8080

A

RemoteByMail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are attempting to infect a system with a Trojan horse as a demonstration to a client that the security on this target system is lacking. Where can you place the file Trojan.exe in the Windows registry such that it will auto start the Trojan horse?

A

HKCR\exefile\shell\open\command

HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce

HKCU\Software\Microsoft\Windows\CurrentVersion\Run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which backdoor countermeasure tool calculates cryptographic hashes of all key system files that have to be monitored for modifications?

A

Tripwire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

YOu are attempting to infiltrate a network by means of a vulnerable workstation, which you have already gained access to. In order to maintain access to the system, you are looking to establish a backdoor. What can you use to create a backdoor that will listen on TCP port 7777, that will also grant access without requiring any validation or authentication?

A

Tini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of Trojan provides attackers with passwords or other confidential data such as credit card numbers and audit sheets?

A

Data-Sending Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What statement accurately describes how an ICMP backdoor trojan utilizes ICMP tunneling?

A

ICMP backdoor trojans make use of ICMP_ECHO and ICMP-ECHOREPLY packet data to carry a payload to a target host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whihc of the tools listen creates a backdoor that listens at port 7777 and gives a remote command promt to anyone who connects?

A

Tini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tool involves the injection of malicious code into a website in a process called cross-site scripting, in order to gain shell access?

A

XSS Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT a typical step in detecting Trojans?

A

Scan for ICMP type 8 packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements about how Trojans function is NOT true?

A

Trojans use UDP to transmit all information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of channel is a legal, secure channel for the transfer of data or information within the network of a company?

A

Overt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of channel is an illegal, hidden path used to transfer data from a network?

A

cover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which famous Trojan creates a backdoor, which allows remote control of a system, and was written in Visual Basic?

A

MoSucker Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You haven been handed a compromised system by your client in order to determine the source of the compromise. Upon viewing the process list of the running system, you spot an odd process by the name MSNETCFG.exe. What trojan software is most likely being used on the system?

A

MoSucker Trojan

17
Q

You are investigating a Windows workstation with a possible infection. You suspect that system files may have been modified after viewing event logs on the system. What command can you use to scan all protected system files and replace corrupted or modified system files with clean versions?

A

sfc /scannow

18
Q

A client has asked you to deploy an application that will monitor files modifications and report on changes. What application should you use for this task?

A

Tripwire

19
Q

When following the steps used for detecting Trojans, which step are you implementing when you use the TCPView?

A

Scan for Suspicious Open Ports

20
Q

What is a program that is used to bind Trojan executable to legitimate files?

A

Wrappers