Exploitation Basics Flashcards
What is a reverse shell?
The connection comes from the target machine. The attacker will listen on a port and cause the target machine to connect to that specific port with a shell.
What is a bind shell?
The connection is made from the attacker machine. The target machine will listen on a port with a shell and the attacker will connect to that port in order to access the shell.
What is a metasploit payload?
It’s a piece of software used to interact with a target machine. It can be used for specifying what you want to do after the exploit or just to scan it like auxiliary payloads.
What is a non-staged payload?
It’s a payload where the exploit shellcode is sent all at once. It’s bigger in size.
What is a staged payload?
It’s a payload where the shellcode is sent in stages. It can be less stable.
How to diferentiate if a payload is a non-staged or staged payload?
By the ‘/’ character
windows/meterpreter/reverse_tcp indicates a staged while windows/meterpreter_reverse_tcp indicates a non-staged.
What is credential stuffing?
It’s the automated injection of stolen usernames and passwords in order to gain access to accounts.
What kind of intruder attack type would you use to perform credential stuffing?
Pitchfork
Why is it important to perform credential stuffing in an assessment?
Because users tend to use the same credentials for many different sites and services.