MODULE 6: System Hacking Flashcards
What type of attack involves loading a dictionary file into a cracking application that runs against user accounts?
a. rule-based attack
b. brute-force attack
c. dictionary attack
c. Dictionary Attack
What type of attack invlves a hacker injecting a compromised hash into a local session and using the hash to validate network resources?
a. Internal Monologue Attack
b. LLMNR/NBT-NS Poisoning
c. Hash Injection/ Pass the hash
What type of attack involves an attacker aquiring access to the communication channel between victim and server to extract information needed?
a. replay attack
b. MITM attack
c. combinator attack
b. MITM attack
What type of attack involves capturing packets and authentication token using a sniffer, then, after relevant info is extracted, the tokens are placed back on the network to gain access?
a. replay attack
b. MITM attack
c. combinator attack
a. replay attack
What is a precomputed table that contains word lists like dictionary files, brute force lists, and their hash values?
a. hash table
b. rainbow table
c. wordlist
What tool is a password auditing and recovery application used for testing password strength and recovering lost Microsoft windows passwords using dictionary, brute force, hybrid, and rainbow tables?
a. L0phtCrack
b. pwdump7
c. nikto
what is a technique where a random string of characters are added to the password before calculating their hashes in order to make it more difficult to reverse the hashes and defeat pre-computed hash attacks?
(NOTE: Windows passwords do not take advantage of this technique
a. password salting
c. password peppering
c. password seasoning
a. password salting
What technique involves sending a large amount of data to the target server so that it experiences buffer overflow and overwrites the EIP register?
This technique helps in identifying the number of bytes required to crash the target server as well as the exact location of the EIP register.
a. Spiking
b. Fuzzing
c. Shellcode Generation
b. Fuzzing
What is a hacker’s first step after gaining access to a network using a non-admin user account in order to gain admin level privs?
a. priv. escalation
b. exploitation
c. enumeration
a. priv. escalation
what vulnerability takes advantage of the ability to read adjacent memory locations of a process and access info for which their account is not authorized?
Using this vuln an attacker can read kernel memory or perform a web based attack using javascript.
a. Meltdown
b. Spectre
c. Nucleus
b. Spectre
What technique involves compromising a system, gaining remote shell on it, and then further accessing systems in the network by bypassing firewalls through this technique?
a. relaying
b. pivoting
b. pivoting
What is a program or hardware device that records keystokes?
Keylogger
What is a stealthy program that records user interaction with the computer and the internet without the user’s knowledge and sends the info to remote attackers?
a. worm
b. virus
c. adware
d. spyware
d. spyware
What is a program that hides its presence as well as the attackers malicious activities , granting them full access to the server or host (usually at kernel level)?
This program replaces certain OS calls and utilities with their own modified versions that cause malicious functions to be executed?
a. Easy Anti-Cheat
b. Rootkit
c. Trojan
d. Keylogger
b. Rootkit
What is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain confidentiality of data?
a. masquerade
b. encryption
c. steganography