Introduction To Ethical Hacking Flashcards
What is hack value ?
An items worth or interest to hacker
What is a zero-day attack ?
Threats and vulnerabilities that can be exploited before a fix is ready
What is a vulnerability ?
It refers to a weakpoint in any system or network
What is an exploit ?
A breach of a systems security through vulnerabilities
What is doxing ?
Publishing information about an individual
What is meant by the term payload ?
Actual section of the information or data in a frame as opposed to metadata
What is a bot ?
Software designed to control the target remotely and to execute predefined tasks
What are the three elements of Information Security ?
Confidentiality, Integrity and Availability
What is confidentiality ?
Only authorized personnel can see or work with digital assets
What is integrity ?
Ensuring assets have not been altered in an unauthorised manner
What is availability ?
Ensuring timely and reliable access to systems
What are the security controls for Confidentiality ?
Encryption, Authentication and Access Control
What are the security controls for Integrity
Audit Logs, Quality Assurance
What are the security controls for Availability
Business Continuity Plans, Backup storage, sufficient capacity
What is non repudiation ?
The assurance of communication and its authenticity so that the sender is unable to deny the sent message
What controls enforce Non Repudiation
Digital signatures, digital contracts
What three aspects of a system measure its level of security
Security, Usability and Functionality
What are the three attack vectors
Motive, Method, Vulnerability
What are some of the common motives for an attack
financial gain, religious or political, disruption, manipulation of data
What is an advance persistent threat ?
The process of stealing information through a continuous procedure
Whats the difference between viruses and worms
Worms have the ability to replicate
What is insider threat ?
A threat originating from a user within the system
What is a botnet ?
Groups of bots connected together through the internet to perform a distributed attack continuously
What are the main threat categories ?
Network, Host, Application
Give some examples of Network level threats ?
Scanning, DOS, Spoofing, MiM, DNS poisoning, Password based
Give some example of Host based attacks ?
Malware, Privelege Escalation, Backdoors, Logon Bypass
Give some examples of Application threats
Improper Data/Validation, Information Disclosure, Buffer Overflow, Sql Injection, Improper error handling
What is a buffer overflow ?
When more data is attributed to a fixed block of memory prevented by code auditing, use of safe functions, patches, compiler tools, bounds checking
Give an example of a misconfiguration attack ?
Leaving password or other settings at the default
What is information warfare ?
The use of information and communication technology to get a competitive advantage over a rival.
What are some typical examples of defensive information warfare ?
Prevention, Deterrence, Detection and Response
What are some examples of Offensive information warfare ?
Various implementations of threat
What are the seven steps in the Cyber Kill chain ?
Reconaissence, Weaponisation, Delivery, Exploitation, Installation, Command and Control, Actions on objectives
What are the seven steps of the cyber kill chain ?
Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, Actions on Objectives
What takes place in the Reconaissence phase of the Cyber Kill Chain ?
Collection of information on the target using DNS lookups, Social Engineering, Network Scanning etc. Security team should monitor port scanning on web servers, website logs and vulnerability scanning on public servers.
What takes place in the Weaponisation phase of the Cyber Kill Chain ?
Preparing to exploit the vulnerability such as developing the payload. Security teams should monitor malware analysis sites, building detection rules
What takes place in the Delivery phase of the Cyber Kill Chain ?
Launching of the attack via phising emails, malware on usb, direct server exploitations.
What takes place in the Exploitation phase of the Cyber Kill Chain ?
Gaining access to the victim and can be combatted by phising training, user awareness training, endpoint hardening, penetration testing
What takes place in the Installation phase of the Cyber Kill Chain ?
Establishes persistency by establishing a backdoor or opening a connection combatted by endpoint auditing, suspicious file creations, registry changes applications using administrator priveleges.
What takes place in the Command and Control phase of the Cyber Kill Chain ?
The communication is opened between victim and C2 server. This is the last chance in the kill chain to prevent damage. Require proxies for all traffic and monitoring sessions.
What takes place in the Actions on Objectives phase of the Cyber Kill Chain ?
This is where the C2 server carries out its objectives such as data modification, data exfiltration or privelege escalation. Countered by incident playbooks, incident readiness, response and escalation.
What takes place in the Actions on Objectives phase of the Cyber Kill Chain ?What
This is where the C2 server carries out its objectives such as data modification, data exfiltration or privelege escalation. Countered by incident playbooks, incident readiness, response and escalation.
What are the five essential hacking phases?
Reconnaissence, Scanning, Gaining Access, Maintaining Access, Clearing Tracks
What is the difference between passive and active reconaissence
Passive - No direct contact with target
Active - Interaction with target
What happens in the gaining access hacking phase ?
Hacker gains control of the operating system
Which hacking phase sees the escalation of priveleges ?
Maintaining Access - This is also where backdoors and trojans are implanted
What happens in the clearing tracks phase of hacking?
Overwriting of logs
What are information security controls ?
Safeguards and controls to minimize cyber risk
What is information assurance ?
Use of CIA - made up of Policies and Procedures
What are the steps to enforce security policies ?
1 Risk Assessment - Identify Risk 2 Guidelines - Learn Standards 3 Management - Include senior management 4 Penalties - Set Penalties 5 Finalization - Ready Final Version 6 Agreement 7 Enforcement - Deploy the policy 8 Training - Train Employees 9 Review and Update
What are the four categories of Security Policy ?
Promiscuous - no restriction
Permissive - restricts only widely known dangerous attacks
Prudent - Max and strongest allow known and necessary risks
Paranoid - Denys everything
What is covered by an Enterprise Information Security Architecture ?
Identifying assets
Monitoring and detection of Network behaviour
Paying attention to various threats
Detection and Recovery of security breaches
Risk Assesment
Cost-effectiveness
What is threat modelling ?
The process of identifying, diagnosing and assessing the threats and vulnerabilities of a application or system
What are the five key stages of threat modelling ?
Identification of Objectives Application Overview Decompose Application Identify Threats Identify vulnerabilities
What is incident management ?
The procedure and method of handling any incident that occurs
What are the 8 steps in incident response ?
Preparation Detection and Analysis Classification Notification Containment Forensic Investigation Eradication and Recovery Post Incident activities
What are the typical members of an incident response team ?
IT personnell, HR, Public Relations Officers, Chief Security Officer, Local Law
What are the responsibilities of the incident response team?
Examine and Evaluate the event Document If required get support of expert Collection of Facts Report
What is vulnerability assessment ?
The process of examining an application or system to withstand any threat
What are the five phases of vulnerability assessment ?
Aquisition - reviews applicable previous vulnerabilites
Identification - gathering of technical information
Analysis - Risk assessment and analysis
Evaluation - Inspection of identified vulnerabilities
Reporting - Tasks covered, Recommendations, Methods and tools used
What are the types of penetration testing ?
Black, Gray and White box
What are the three main phases of penetration testing ?
Pre - Attack Information gathering
Attack - Penetration, Acquiring the target
Post - Attack Securing cleaning and reporting
Name some security testing methodologies ?
OWASP, Open Source Security Testing Methodology Manual, EC-Council licensed penetration tester