MOD 6 - System Hacking Flashcards

1
Q

Password Salting

A

Adding some random characters to a password before hashing. This makes the PW a little longer and more random, which makes cracking attempts harder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Password cracking programs
A

John the Ripper, L0phtcrack, THC-Hydra, Cain, Hashcat, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Pass-The-Hash
A

If an attacker gets your password hash, they really don’t even need to crack it to impersonate you. They could just do a Pass-The-Hash attack to transmit your hash for logon. The only way to prevent this is to not let an attacker get your hashes!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Internal Monologue Attack
A

Attacks the (older) NetNTLMv1 protocol to steal password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • CHNTPW
A

(Change NT PassWord) Linux command-line tool found on an Ubuntu Live CD that lets an attacker edit a Windows SAM file to change user passwords and to activate disabled accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Metasploit

A

Automated exploitation framework containing thousands of exploits for known vulnerabilities.
rhost = victim (receiving host), lhost = attacker (listening host - listening for a command prompt to be sent from victim’s machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSFvenom - multiple labs on this!

A

Can generate and encode payloads. For example, it can generate shellcode to gain shell access on a victim computer. The -f switch formats the payload. Two common format options are -f c, which creates code that can be pasted into a program, and -f exe >MyShellCode.exe, which creates an executable file to target a Windows machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*getsystem

A

Once you’ve gotten a meterpreter command-prompt with a successful Metasploit attack, the getsystem command will attempt a privilige escalation attack on the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Buffer overflows

A

Understand the basics of what a buffer overflow is and how it could lead to problems.
“ The ““C”” programming languages are very susceptible to buffer overflows because they can manipulate memory blocks (C, C++, etc.).
C# (C-Sharp) is an exception to that rule because it is protected from memory manipulation attacks.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privilege Escalation

A

Acquiring the permissions/rights of another user. Horizontal = another user at your same level. Vertical = gaining higher-level rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkits, types of Rootkits

A

Kernel rootkits get into the core of your OS and often go undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Covering Tracks

A

Several ways to do this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS tunneling

A

Method of cyber attack that encodes the data of other programs or protocols inDNSqueries and responses. For example, this could use DNS requests to implement a command and control channel for malware. Inbound DNS traffic can carry commands to the malware, while outbound traffic can exfiltrate sensitive data or provide responses to the malware operator’s requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP or ICMP tunneling

A

Reverse HTTP Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Auditing

A

Part of clearing your tracks on a target system is to turn auditing off, clear the logs, do your malicious deeds, then turn auditing back on just before you disconnect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Auditpol
A

Windows command-line command to configure, enable, or disable auditing.

17
Q

.bash_history file

A

In Linux, everything you type in a terminal windows is saved to the .bash_history file, including passwords! Attackers clear the contents of this file to cover their tracks.

18
Q

Steganography

A

Hiding secret messages in ordinary messages. Hiding them “in plain sight”. Often employed in image files, videos, documents, etc.

19
Q
  • Shellshock
A

High-profile vuln with the popular Linux Bash shell. Affects Linux, Unix, Mac OS X (which is built on Linux). Lets an attacker remotely configure your Linux environment (system) variables.

20
Q
  • Linux misc.:
A

The command ls -l (looksee -long-info) will display a directory listing of files & sub-folders for the folder/directory you’re currently in. The cat command can then display a file’s contents to the command prompt. File names that start with a period are hidden. For example .bash_history is hidden in your home folder.