Hacking Methodology Flashcards
1
Q
List the CEH Methodology
A
- Recon/Footprinting
- Scanning
- Enumeration
- Vulnerability Assessment
- System Hacking
2
Q
CEH Hacking Sub-Methodologies
A
a. Gaining Access
b. Privilege Escalation
c. Maintaining Access
d. Clearing Logs
3
Q
Define Gaining Access
A
Bypassing security controls
4
Q
Gaining Access Techniques
A
Password cracking
Vulnerability exploitation
Social Engineering
5
Q
Define Horizontal Privilege Escalation
A
Same privileges with different users or systems
6
Q
Define Vertical Privilege Escalation
A
Moving from a state of lower privileges to higher privileges
7
Q
Privilege Escalation Techniques
A
Vulnerability Exploitation
Security Misconfigurations
8
Q
Maintaining Access Tools
A
Executing Applications/Malware Hidden files (i.e. Steganography)