Exploitation Basics Flashcards

1
Q

What is a reverse shell?

A

The connection comes from the target machine. The attacker will listen on a port and cause the target machine to connect to that specific port with a shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a bind shell?

A

The connection is made from the attacker machine. The target machine will listen on a port with a shell and the attacker will connect to that port in order to access the shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a metasploit payload?

A

It’s a piece of software used to interact with a target machine. It can be used for specifying what you want to do after the exploit or just to scan it like auxiliary payloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a non-staged payload?

A

It’s a payload where the exploit shellcode is sent all at once. It’s bigger in size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a staged payload?

A

It’s a payload where the shellcode is sent in stages. It can be less stable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to diferentiate if a payload is a non-staged or staged payload?

A

By the ‘/’ character
windows/meterpreter/reverse_tcp indicates a staged while windows/meterpreter_reverse_tcp indicates a non-staged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is credential stuffing?

A

It’s the automated injection of stolen usernames and passwords in order to gain access to accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of intruder attack type would you use to perform credential stuffing?

A

Pitchfork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is it important to perform credential stuffing in an assessment?

A

Because users tend to use the same credentials for many different sites and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly