Lesson 14 - System Hacking Flashcards
What is the open source cross platform development environment and where did it originate from
.NET = .NET Core
Original .NET was a Microsoft framework
What is the C2 Framework that is focuses on PowerShell but does have a Python component for Linux
Empire
Maintained by Kali Linux
no longer effective due to its popularity
A C2 framework but on .NET so what is the advantage?
Covenant - Cross Platform
Aims to show the attack surface of .NET and make attacks through this vector easier.
Cross Platform C2 framework but also contains payloads such as Apfell and Poseidon for testing MAC OS
Mythic
What is a Powershell Tools that includes a large set of scripts for Windows Post Exploitation
Nishang
What is the tool that is used to read from or write to TCP, UDP, or Unix Domain socket network connections. Also referred to as the swiss army of hacking tools
NETCAT
Syntax
nc [options] [target address] [port(s)]
-l listen mode (default)
- u starts in UDP mode
- p - port it should listen
- e program to excecute
- n not to perform DNS
- z - zero I/O mode without payload
- w timeout in seconds
- v verbose mode
- vv - very verbose mode
What is the tool similar to NETCAT developed my Nmap as an improvement
Ncat
What is the replacement for Telnet that runs over a secure TCP Port 22
Secure Shell (SSH)
unlike Netcat and Ncat SSH was not developed with network testing in mind.
Also has the ability to copy files which Telnet does not have
What is the Linux command that is similar to Telnet but if the server has a .rhosts file configured you can bypass credentials
rsh/rlogin
What is the big issues still prevalent in Cloud Security
Exposed Keys and misconfiguration.
Pacu is a good tool for this as long as you have access to
Which Metasploit tool is the most common for performing enumeration and what is the term when an attacker uses a compromised host as a platform to spread an attack to other points in the network
Meterpreter
Pivot
One example of the use of reverse engineering would be
Attempt to analyze Digital Rights Management (DRM)
What are the 3 primary methods of reverse engineering
Decompilation
Disassembly
Debugging
The process of reviewing uncompiled source code either manually or using automated tools
Static Code Analysis
What is the reverse engineering method that will allow you to determine if the apps logic will produce unintended results
Decompilation - - tool that converts machine code/assembly to code in a specific higher level-language
Note: if they use obsucation then that can make interpretation difficult