Hacker methodology Flashcards

1
Q

Methodology

A
Cracking Password
    Escalating Privileges
    Executing Applications
    Hiding Files
    Covering Tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hacking Goals

A
Bypass the access control
Gain access to the system
Exploit vulnerabilities
Gain privileges
Execute applications
Hide malicious activities
Hide the evidence of compromising
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Registered dlls key

A

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is done during the “executing application” phase

A
Install malware to collect information
    Setup Backdoor to maintain access
    crack passwords and scripts
    Install Keylogger
    etc...
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what occurs during gaining access (ceh Hacking goals)

A

Cracking Passwords

Escalating Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what occurs during maintaining access (ceh Hacking goals)

A

Executing applications

Hiding Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what occurs during clearing tracks (ceh Hacking goals)

A

deleting logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Enumeration

A

the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is Enumeration

A

the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Link-local Multicast Name Resolution/ NetBios Name Service attack

A

Victim uses service to find resource. Attacker broadcasts that they are the resource and poisons Victims service. This is multicast. If the interaction require authentication victim sends NTLNv2 user name and hash. offline cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

three phases of a pen test

A

preparation, assessment (security or conduct phase), conclusion (post-assessment phase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly