Final Exam Flashcards

1
Q

Reconnaissance

A

To investigate the target using publicly available information. One key objective is to have a list of the target’s IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scanning

A

To look for openings of target’s system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Scanning

A

Output is a list of open ports and potential services running on the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploitation

A

Using password cracking and other techniques to gain administrative control over the target machine, but the access may be temporary and non-persistent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maintaining Access

A

Creating a more permanent backdoor for subsequent access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active Reconnaissance

A

Interacting directly with the target. The target may record your IP address and log your activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Passive Reconnaissance

A

Makes use of the vast amount of information available on the web. You do not directly interact with the target and as such, the target has no way of knowing, recording, or logging your activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Google as a Reconnaissance Tool

A

Search the Google cache rather than the target’s web site to reduce your digital footprints on the target’s server, and to gain access to files that have been removed from the target’s web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

theharvester

A

A program to collect email addresses from the Web using google, bing, etc.
Theharvester is intergated into kali.
Username can be used in brute force password cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Interrogating DNS Server

A

Networks may need multiple DNS servers for the sake of redundancy (fault tolerance) or load balancing. These DNS servers need to stay in sync by doing zone transfer (a.k.a. AXFR or Asynchronous Full Transfer Zone), where one DNS server will send all its host-to-IP mappings to another DNS server.
Hackers may attempt zone transfer to acquire all IP address for subsequent scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defence: Interrogating DNS Server

A

Allow “zone transfer” only for legitimate users such as secondary DNS.
DNS records should not contain operating system type and version information. DO NOT keep host information and text records (HINFO and TXT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

METAGooFIL

A

Microsoft documents such as Word or a PowerPoint contain metadata that describes the file name, the file size, file owner, username, and path of location.
MetaGooFil scours a specific target for such files, download them, and extract useful metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port scanning: Nmap

A

A port scanner (e.g. Nmap) sends a packet to each port to determine which ports are open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Xmas Scan & Null Scan

A

X-mas Scan sends packets with FIN, URG and PUSH flags turned on, but SYN,ACK, & RST off.

Null Scan sends a packet with no TCP flags set.
Closed port responds with RESET, and live port sends nothing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specially Crafted Probes

A

A specially crafted packet that the remote system can’t understand or deal with
e.g. a packet longer than the expected packet size (548 byte) and thus causes buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defense Against Port Scanning

A

All unneeded ports and their related services must be shut off. Periodically use Nmap to scan (across network) for open ports on each host, and closed all unused ports (e.g. TCP 25 for SMTP on Web server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerability Scanners and Common Vulnerabilities

A

Vulnerability scanners keep a database of vulnerabilities of many systems, and automate the process of checking across the network to see if any of these known vulnerabilities are present on the target. Common vulnerabilities are:

(1) Poor configuration settings leave various openings for an attacker to gain access. e.g. files not properly protected
(2) Weak default configuration security settings such as default accounts and passwords.
(3) Well-known system vulnerabilities and new security holes are discovered and published on the Internet, but patching may be slow to catch up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Nessus (pre-installed on kali)

A

Nessus is a vulnerability scanner. It automates the process of connecting to the target, and checking for:

(a) backdoors, vendor specific vulnerabilities (Cisco, Windows, etc.)
(b) loopholes that let attackers gain command-line access or super-user access remotely
(c) vulnerable cgi (also asp, jsp, php, etc) scripts
(d) misconfigured firewall
(e) missing patching

19
Q

Vulnerable CGI Scripts

A

Run on the Web-server side to process user input. Many widely used CGI scripts include flaws that accept inputs with embedded malicious commands. The CGI script then allow the attacker to send the embedded malicious commands directly to the command line for execution.

20
Q

Exploitation

A
Attackers gaining access through
Program loopholes (e.g. stack-based buffer overflows attack)
password attacks
Sniffing network traffic
Or through Web exploitation
SQL injection
Web application attacks
21
Q

Stack-Based Buffer Overflows Attack

A

stack = a special reserved area for storing information on subroutines and functions
A program writing more data (i.e. exceeding the allocated buffer) to a memory address in the stack causes this data to overflow and corrupt adjacent data on the stack.
Attackers enters input data (containing attack code) into a program through a GUI, or command line. The input data corrupts the stack and cause executable attack code to be run.

22
Q

NOP Command

A

A command telling the processor to do nothing and move on.

23
Q

Administrators’ Defense Against Stack-Based Buffer Overflows Attack

A

Keep systems patched. The computer underground and security professionals are constantly discovering new vulnerabilities.
Use a nonexecutable stack (i.e. only read and write). If the system is configured to refuse to execute instructions from the stack, most stack-based buffer overflows won’t work.
Software developers must be trained to understand what buffer overflows are and how to avoid them. Computer code should check size of input against buffer size before writing.

24
Q

Metasploit: an Exploitation Platform

A

Manually crafting an exploit tool to take advantage of a flaw (e.g. buffer overflow) is a painstaking process. Loading the attack machine code and calculating the return pointer require great care.
Metasploit provides a platform for mass production of exploits.
Metasploit is installed in kali

25
Q

Metasploit Attack 3 Steps

A

Choosing exploit. A vulnerability (e.g. missing a patch) may be open to zero or multiple exploits (codes to exploit the vulnerability).

Choosing payload (command shell such as meterpreter which stealthily runs entirely in memory without using harddisk, admin user, installing remote control software, etc)

Choosing target

26
Q

Administrator’s use of Metasploit

A

Some vulnerability scanner (Nessus) may report false alarms/false vulnerabilities (30-40%). Metasploit can confirm if a vulnerability exists.

Use Metasploit in penetration testing of the strength of firewall, IPS/IDS, etc.

27
Q

Encrypt Versus Hash (very simplistic view)

A

Encrypt: A->C, B->D, C->E;
CAB->ECD

Hash: CAB->log(676566) = 5.8303102…
Note: ASCII value: A=65, B=66, C=67

Hashes are irreversible.

28
Q

User Mode vs Kernel Mode

A

Applications run in user mode, and core operating system components run in kernel mode. Many drivers run in kernel mode, but some drivers run in user mode.

29
Q

User Mode

A

In User Mode, when a user enters his or her username and password during the logon process, the Security subsystem sends these entries to SAM (security account manager). The SAM has a user authentication database (SAM database).
SAM database contains two encrypted passwords (i.e. LM lan manager and NT new tech) for each user account.

30
Q

LM Password

A

LM is calculated for passwords with 14 or fewer characters.
LM representation is calculated only after all characters have been converted to uppercase.
LM is then broken into two 7 character passwords

31
Q

NT Pasword

A

NT password hashes (i.e. similar to encryption) are far stronger (i.e. using more secure algorithm)
Modem versions of Windows do not use LM passwords by default, but have options to enable LM passwords to support backward compatibility with legacy systems. Enabling LM passwords for legacy systems puts the entire network at risk.
The lesson:
Upgrade and discard old systems (win95, 98).

32
Q

Medusa

A

Online password guessing tool integrate with kali
user names from theHarvester and metagoofil
Ip addresses from reconnaissance

33
Q

Password Guessing Limitations

A

Password guessing is slow. Each login attempt could take a few seconds (transmission, encrypting submitted password, looking up real userID and encrypted password, comparison, etc).
The constant attempts to login to the target generate a significant amount of network traffic and log activity, which could easily alert a system administrator or an IDS/IPS. Some systems are configured to disable an account after a fixed numbers of login failures (password throttling). The user must call the help desk or wait for a time out. This account lockout feature helps prevent password-guessing attacks through login scripting.
However, with account lockout in place, an attacker could conduct a denial-of-service attack by locking out all accounts using a script.

34
Q

Password Cracking Tools

A

Cain (run on Windows)

John the Ripper (run on Unix, Linux, Windows, etc.)

The password cracking software runs on the attacker’s computer, and will not alert the target’s administrator or IDS/IPS.

35
Q

Cain/John the Ripper

A

Cain supports reverse dictionary guesses, apply mixed case to guesses, and appends numbers to words.

John (part of kali) will append and prepend characters, and attempt dictionary words forward, backward, and typed in twice. It will even truncate dictionary terms and append/prepend characters to the resulting strings.

36
Q

Persistent Cookie

A

Written to the local file system when the browser is closed, and will be read the next time the browser is executed. Persistent cookies, therefore, are most often used to store long-term user preferences.

37
Q

Netcat

A

Allows a user to move data across a network, while functioning much like the UNIX “cat” command. While cat just dumps data on the local system, Netcat moves arbitrary data over the network through any TCP or UDP port.

38
Q

2 Modes of Netcat

A

In listener mode (listener = server, which is invoked with the -l option), Netcat opens any TCP or UDP port on the local system, waiting for data to come in through that port. Netcat listeners send all data gathered from the network to standard output, which could be displayed on the screen or piped through another program.

In client mode, Netcat can be used to initiate a connection to any TCP or UDP port on another machine. Netcat takes its data from standard input (i.e. the keystrokes from keyword) or data from a program (piped into it) and sends the data across the network.

39
Q

Rootkit

A

Embed themselves deep into the operating system (kernel) and help hackers completely hide malicious processes and programs from users, administrators, and even the operating system.
Rootkits are so effective at hiding files that they are successful at evading even the most finely tuned antivirus software.

40
Q

Hidden Table

A

Hiding files and folders from explorer and task manager. Admin may check % ls -al

41
Q

Hidden Processes

A

Hiding processes or programs from a task manager. Admin may check % ps -a

42
Q

Root Processes

A

Grant processes the right to access hidden folders and processes.

43
Q

Hidden Services

A

Hiding services from a task manager. Services run in the background. Admin may check % ls /etc/init.d/ or ls rc.d for startup script or running command.