Introduction to Ethical Hacking, Ethics, and Legality Flashcards
Types of attacks
Active Attack OR Passive Attack
Inside Attack OR Outside Attack
Phases of hacking
Phase 1— Reconnaissance
Phase 2— Scanning
Phase 3— Gaining Access
Phase 4—Maintaining Access
Phase 5—Covering Tracks
Passive reconnaissance
Gathering information regarding a potential target without
the targeted individual’s or company’s knowledge.
Different Types of Hacker Classes
White hats
Black hats
Grey hats
Basic elements of security
CIA+1
Confidentiality
Integrity
Availability
Authenticity
The three phases of a security evaluation plan?
Preparation
Conduct security evaluation
Conclusion.
Back Orifice port
Port 31337
The Four existing Regional Internet Registry (RIR’s)
RIPE NCC
LACNIC
ARIN
APNIC
Tools used for footprinting
Sam spade
NSLookup
Traceroute
Neotrace
The next step after footprinting
Scanning
What port should you look for to attempt a zone transfer?
TCP/53