Hackers & Their Tools Flashcards
What is a directed attack?
A network attack executed by a hacker
What 3 applications are favorite targets for application layer attacks? Why?
FTP
Sendmail
HTTP
Because permission levels granted to these accounts is often privileged
What should you properly configure on your anti-virus to help protect against activeX attacks?
The on-access component
Hackers will typically use a what to attack a Mac or Unix box?
A Rootkit
Port scans, DNS queries, ping sweeps and phishing are employed in what hacking activity?
Network Reconnaissance
Describe an FTP Bounce attack
The attacker uses the FTP PORT command to request access to ports indirectly by using the victim’s machine as a middleman.
An attacker gains control of a host outside the firewall, what type of attack is this?
Trust-Exploitation
ATM machines and credit card swipers are tools used in what type of attack?
Man-In-The-Middle
How does Banner Grabbing work?
An attacker connects to the device using telnet,SMTP or HTTP and generates an error to display the banner and extract useful information from it
What should you do to mitigate banner attacks?
Disable any service not in use
Why is it dangerous to leave default local accounts enabled or unchanged?
Hackers can use them to circumvent domain authentication
What two steps should be carried out to mitigate misconfigured applications?
1) Fuzz testing and strict code reviews
2) Ensure all input validated before it is accepted by the application
Which of the following steps should you take if you get a call from someone in your IT department asking for your personal information to investigation something?
A) Refuse to give it and hang up
B) Give them the information, they’re helping you out after all
C) Confirm their information and verify it with your IT dept before you give him any information
C
What the name given to when of pieces of code embedded into an application that would cause a harmful effect when certain conditions are satisfied?
Logic Bomb
What software encrypts users machines, making them unusable unless demands are met?
Ransomware