IA - Ethical Hacking Flashcards

1
Q

is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

identification and assurance of the origin of information.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the concealment of information or resources

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to the ability to use the information or resource desired

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

person who enjoys learning the details of computer systems and stretch their capabilities.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to a person who uses his hacking skills for offensive purposes.

A

cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to security professionals who apply their hacking skills for defensive purposes

A

ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • An action or event that might prejudice security
  • potential violation of security
A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An IT system, product, or component that is identified/subjected as requiring security evaluation.

A

Target of Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • An assault on system security that derives from an intelligent threat.
  • any action that violates security.
A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A defined way to breach the security of an IT system through vulnerability.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

can be defined as a legal and authorized attempt to locate and successfully exploit computer systems for the purpose of making those systems more secure.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • The process includes probing for vulnerabilities as well as providing proof of concept attacks to demonstrate the vulnerabilities are real.
  • testing always ends with specific recommendations for addressing and fixing the issues that were discovered during the test.
  • find security issues by using the same tools and techniques as an attacker. These findings can then be mitigated before a real hacker exploits them.
A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration testing is also known as

A
  1. pen testing
  2. pt
  3. ethical hacking’
  4. hacking
  5. white hat hacking
  6. offensive security
  7. red teaming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The first and simplest way to differentiate between white hats and black hats is

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The second way to differentiate between an ethical hacker and a malicious hacker is through examination of the attacker’s

A

motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

to provide the organization a realistic attack simulation so that the company can improve its security through early discovery and mitigation of vulnerabilities, the attacker should be considered a white hat.

A

intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Differentiate Ethical from Malicious Hacker?

A
  1. authorization
  2. motivation
  3. intent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What Does a Malicious Hacker Do

A

1.recoinnaissance
2.scanning
3. gaining access
4. maintaining access
5. covering tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.

A

scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • refers to the true attack phase.
  • The hacker exploits the system.
A

gaining access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • refers to the phase when the hacker tries to retain his ‘ownership’ of the system.
  • The hacker has exploited a vulnerability and can tamper and compromise the system.
A

maintaining access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.
  • Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.
  • Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance
A

Covering Tracks

26
Q
  • Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as ‘Crackers.’
  • Reformed crackers
    First-hand experience
    Lesser credibility perceived
A

Black hats

27
Q
  • Individuals professing hacker skills and using them for defensive purposes. Also known as ‘Security Analysts’.
  • Independent security consultants (maybe groups as well)
    Claims to be knowledgeable about black hat activities
A

White Hats

28
Q
  • Individuals who work both offensively and defensively
  • Part of ICT firms
    Good credentials
A

gray hats

29
Q
  • hacking with / for a cause’.
  • Comprises of hackers with a social or political agenda
  • Aims at sending across a message through their hacking activity and gaining visibility for their cause and themselves.
A

hacktivism

30
Q

Ethical hackers tries to answer

A
  • What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)
  • What can an intruder do with that information? (Gaining Access and Maintaining Access phases)
  • Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)
31
Q

Skill Profile of an Ethical Hacker

A
  1. Computer expert adept at technical domains.
  2. In-depth knowledge about target platforms (such as windows, Unix, Linux).
  3. Exemplary knowledge in networking and related hardware / software.
  4. Knowledgeable about security areas and related issues – though not necessarily a security professional.
32
Q

There are five e-Business certification tracks under EC-Council Accreditation body:

A
  1. Certified e-Business Associate
  2. Certified e-Business Professional
  3. Certified e-Business Consultant
  4. E++ Certified Technical Consultant
  5. Certified Ethical Hacker
33
Q

Any security evaluation involves three components

A
  1. preparation
  2. conduct
  3. conclude
34
Q

In this phase, the evaluation technical report is prepared based on testing potential vulnerabilities.

A

Conduct

35
Q

In this phase, a formal contract is signed that contains a non-disclosure clause as well as a legal clause to protect the ethical hacker against any prosecution that he may attract during the conduct phase. The contract also outlines infrastructure perimeter, evaluation activities, time schedules and resources available to him.

A

Preparation

36
Q

In this phase, the results of the evaluation is communicated to the organization / sponsors and corrective advise / action is taken if needed.

A

Conclusion

37
Q

Modes of Ethical Hacking

A
  1. Remote network
  2. Remote dial-up network
  3. Local network
  4. Stolen equipment
  5. Social engineering
  6. Physical entry
38
Q

This mode attempts to simulate an intruder launch an attack over the Internet.

A

Remote network

39
Q

This mode attempts to simulate an intruder launching an attack against the client’s modem pools.

A

Remote dial-up network

40
Q

This mode simulates an employee with
legal access gaining unauthorized access
over the local network.

A

Local network

41
Q

This mode simulates theft of a critical information resource such as a laptop owned by a strategist, (taken by the client unaware of its owner and given to the ethical hacker).

A

Stolen equipment

42
Q

This aspect attempts to check the integrity of the organization’s employees

A

Social engineering

43
Q

This mode attempts to physically compromise the organization of ICT infrastructure

A

Physical entry

43
Q

Security testing can be conducted using one of two approaches

A
  1. black box
  2. white box
44
Q

with no prior knowledge of the infrastructure to be tested

A

Black-box

45
Q

with a complete knowledge of the network infrastructure

A

White-box

46
Q

is also known as Gray-box testing and this examines the extent of access by insiders within the network

A

Internal Testing

47
Q

Deliverables

A
  1. Ethical Hacking Report
  2. Details the results of the hacking activity
  3. Vulnerabilities are detailed and avoidance measures suggestedIssues to consider
48
Q
  • the blueprinting of the security profile of an organization, undertaken in a methodological manner.
  • one of the three pre-attack phases. The others are scanning and enumeration.
  • results in a unique organization profile with respect to networks
A

Footprinting

49
Q
  • is a program to query Internet domain name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure
  • Helps find additional IP addresses if authoritative DNS is known from whois
  • MX record reveals the IP of the mail server
A

Nslookup

49
Q
  • works by exploiting a feature of the Internet Protocol called TTL, or Time To Live
  • reveals the path IP packets travel between two systems by sending out consecutive UDP packets with ever-increasing TTLs
A

Traceroute

50
Q

Information Gathering Methodology

A
  1. Unearth initial information
  2. Locate the network range
  3. Ascertain active machines
  4. Discover open ports / access points
  5. Detect operating systems
  6. Uncover services on ports
  7. Map the Network
51
Q

Unearthing Initial Information:
Commonly includes

A
  1. Domain name lookup
  2. Locations
  3. Contacts
52
Q

Unearthing Initial Information:
Information Sources

A

Open source
Whois
Nslookup
Hacking Tool:
Sam Spade

53
Q

Locate the Network Range

A

Commonly includes:
1. Finding the range of IP addresses
1. Discerning the subnet mask
Information Sources:
1. ARIN (American Registry of Internet Numbers)
1. Traceroute
Hacking Tool:
1. NeoTrace
1. Visual Route

54
Q
  • allows search on the who is database to locate information on networks autonomous system numbers (ASNs), network-related handles and other related point of contact (POC).
  • whois allows querying the IP address to help find information on the strategy used for subnet addressing.
A

ARIN

55
Q
  • useful network information utility that allows you to find out all available information about an IP address, host name, or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information
  • can find the information about a computer located in any part of the world
A

SmartWhois

55
Q

provides high level views as well as detailed and historical views that provide traffic information in real-time or on a historical basis.

A

VisualLookout

55
Q

e-mail analysis tool that enables analysis of an e-mail and its headers automatically and provides graphical results

A

eMailTrackerPro

56
Q

is a tracking service that allows the user to track when his mail was read, for how long and how many times

A

Mail Tracking

56
Q

can reveal public information of a domain that can be leveraged further

A

Whois, ARIN

57
Q

can be used to target specific IP and later for IP spoofing.

A

Traceroute and mail tracking

58
Q

can reveal specific users and zone transfers can compromise DNS security

A

Nslookup