Lesson 14 - System Hacking Flashcards

1
Q

What is the open source cross platform development environment and where did it originate from

A

.NET = .NET Core

Original .NET was a Microsoft framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the C2 Framework that is focuses on PowerShell but does have a Python component for Linux

A

Empire
Maintained by Kali Linux

no longer effective due to its popularity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A C2 framework but on .NET so what is the advantage?

A

Covenant - Cross Platform

Aims to show the attack surface of .NET and make attacks through this vector easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross Platform C2 framework but also contains payloads such as Apfell and Poseidon for testing MAC OS

A

Mythic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Powershell Tools that includes a large set of scripts for Windows Post Exploitation

A

Nishang

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the tool that is used to read from or write to TCP, UDP, or Unix Domain socket network connections. Also referred to as the swiss army of hacking tools

A

NETCAT

Syntax
nc [options] [target address] [port(s)]

-l listen mode (default)
- u starts in UDP mode
- p - port it should listen
- e program to excecute
- n not to perform DNS
- z - zero I/O mode without payload
- w timeout in seconds
- v verbose mode
- vv - very verbose mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the tool similar to NETCAT developed my Nmap as an improvement

A

Ncat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the replacement for Telnet that runs over a secure TCP Port 22

A

Secure Shell (SSH)

unlike Netcat and Ncat SSH was not developed with network testing in mind.

Also has the ability to copy files which Telnet does not have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Linux command that is similar to Telnet but if the server has a .rhosts file configured you can bypass credentials

A

rsh/rlogin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the big issues still prevalent in Cloud Security

A

Exposed Keys and misconfiguration.

Pacu is a good tool for this as long as you have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Metasploit tool is the most common for performing enumeration and what is the term when an attacker uses a compromised host as a platform to spread an attack to other points in the network

A

Meterpreter

Pivot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One example of the use of reverse engineering would be

A

Attempt to analyze Digital Rights Management (DRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 primary methods of reverse engineering

A

Decompilation
Disassembly
Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of reviewing uncompiled source code either manually or using automated tools

A

Static Code Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the reverse engineering method that will allow you to determine if the apps logic will produce unintended results

A

Decompilation - - tool that converts machine code/assembly to code in a specific higher level-language

Note: if they use obsucation then that can make interpretation difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the reverse engineering software that converts machine language into assembly language

A

Disassembly

has some disadvantages vs decomplication but more common than decompilers and more accurate

17
Q

What is the reverse engineering tools used to analyze software as it excecutes

A

Debugging

running state by stepping through, halting or otherwise modifying programs underlying code

18
Q

A debugger included with Kali Linux that analyzes binary code found in 32 bit windows

A

OllyDbg

19
Q

A debugger that includes both CLI’s and GUIS and can load and modify Python Scripts during rutime

A

Immunity Debugger

20
Q

Open source debugger that works on most OS’s (Mac, Windows and Linux)

A

GNU Debugger (GDB)

21
Q

A commercial disassembler and debugging tool with numerous processors and file formats

A

Interactive Disassembler (IDA)

22
Q

What is the open-source reverse engineering tool developed by the NSA. Has disassember and decompiler and can use GDB and WinDBG

A

Ghidra

23
Q

What are unexplainable portion of code that servers no identifiable purpose

A

Code Caves
Result from compiling process

24
Q
A