Intro Course Flashcards
Tool in Kali for cracking passwords in brute force attacks (dictionary)
Hydra
Linux Distribution System
Kali Linux
An attack that renders a machine unusable by flooding the target with information that causes a crash
DOS attack (denial of service attack)
When a hacker places a sniffer between and catches the data between one host and another
MITM (Man in the middle) or on path attack
Tool can be used to scan and map computers on a network
NMap
The step of the attack in which the attacker opens and maintains communication channel between the target computer and the attacker computer
Command and Control (phase 6)(Lockheed Martin kill chain)
When a hacker is manipulating someone to get something he wants
Social Engineering
Three types of social engineering
Phishing attack, vishing attack, and Pretexting attack
How is a Phishing attack done?
Via email
How is a Vishing attack done?
Via phone
How is a Pretexting attack done?
In person
Works directly with the operation system and saves files to the file system
Desktop application
What is the purpose of 2 factor authentication?
To add an extra layer to the authentication process
Persistent module is another name for a backdoor
Installation (Phase 5)(Lockheed Martin kill chain)
Analyses misconfigured endpoints
Microsoft Defender ATP