Mantaining Access Flashcards
Aprender cosas nuevas
What are backdoords?
Are programs designed to deny or disrupt the operation, gather information that leads to exploitation or loss of privacy.
What are crackers?
Are components of software or programs designed for cracking a code or passwords.
What does do keyloggers?
They record each keystroke made on the computer keyboard.
What does do spywares?
They capture screenshots and send them to a specified location defined by the hacker.
How does software become vulnerable to variuous attacks?
Because developers employ unsecure coding practices.
What is the remote code execution technique “exploitation for client execution”?
Attackers employ vulnerabilities in software through exploitations with an objective of arbitrary code execution.
Can you explain Web-Browser-Based Exploitation and Office-Applications-Based Exploitation?
Attackers target web browsers through spear phishing links and drive-by compromise.
Attackers target common office applications such as Microsoft Office through different variants of spear phishing.
What are system services?
Are programs that run and operate at the backend of an operating system.
Explain the remote code execution technique “service execution”?
Attackers run binary code that use system services such as “service control manager” to mantain access.
What is Windows Management Instrumentation?
Is a feature in Windows administration that provides a platform for accessing windows system resources locally and remotely.
What is Component Object Model (COM)?
windows
Is a Microsoft-developed technology that allows software components to communicate and interact within the same system or across different applications.
Tell port number and explain Distributed Component Object Model (DCOM)
Extends COM.
Is a Microsoft technology that allows software components to communicate over a network. It extends COM (Component Object Model) by enabling applications to interact remotely across different machines.
Port 135.
How attackers interact with Windows Management Instrumentation?
WMI helps attackers gain both local and remote access through WMI remote services such as the Distributed Component Object Model (DCOM) via port 135 and Windows Remote Management (WinRM) via HTTP port 5985 and HTTPS port 5986.
What is Windows remote management?
Is a windows-based protocol designed to allow a user to run an executable file, modify system services, and the registry on a remote system.
How does attackers use the windows remote management for hacking?
They execute a payload on the remote system as part of lateral movement.
Name an application for remote windows administration with admin tools and AD administration tools.
Dameware remote support.
What are the main two types of keystroke loggers?
Hardware keyloggers and software keyloggers.
What is the primary function of a keystroke logger?
Capture and store every keystroke made by a user
A penetration tester installs a device between a victim’s keyboard and computer to capture keystrokes. What type of keystroke logger is being used?
Hardware keylogger
What is a key feature of a software-based keystroke logger?
Can be installed remotely via malware
An attacker installs a keylogger that specifically records keystrokes entered in a web browser. What type of keylogger is this?
Application keylogger
Application keyloggers operate at the application level, targeting specific software like web browsers, office applications, or messaging apps.
What is the primary characteristic of a kernel-based keylogger?
It hooks into the OS kernel to log keystrokes
A keylogger is found embedded within the BIOS of a compromised machine. What is the major security risk of this type of keylogger?
It persists even after reinstalling the operating system
A security researcher finds a malicious keyboard that logs keystrokes before transmitting them wirelessly. What is this attack vector known as?
Keylogger keyboard