Module 6 - System Hacking Flashcards
How does an operating system protect the passwords used for account logins?
A) The operating system performs a one-way hash of the passwords.
B) The operating system encrypts the passwords, and decrypts them when needed.
C) The operating system stores all passwords in a protected segment of nonvolatile memory.
D) The operating system stores the passwords in a secret file that users cannot find.
A
Which of these cracks passwords by utilizing a pre-computed table of password hashes?
A) Dictionary attack
B) Brute Force attack
C) Hybrid attack
D) Rainbow Table attack
D
Which of these is a technique to use DNS to sneak data or malware past your corporate firewall, which could then be used for communication from a victim’s machine to a C&C server?
A) DNS tunneling method
B) DNS cache snooping
C) DNSSEC zone walking
D) DNS enumeration
A
Consider this output from a hacker’s machine targeting another machine with the IP address of 192.168.3.10:
[ATTEMPT] target 192.168.3.10 – login “root” – pass “a” 1 of 20
[ATTEMPT] target 192.168.3.10 – login “root” – pass “123” 2 of 20
[ATTEMPT] target 192.168.3.10 – login “admin” – pass “a” 3 of 20
[ATTEMPT] target 192.168.3.10 – login “admin” – pass “123” 4 of 20
[ATTEMPT] target 192.168.3.10 – login “guest” – pass “a” 5 of 20
[ATTEMPT] target 192.168.3.10 – login “guest” – pass “123” 6 of 20
[ATTEMPT] target 192.168.3.10 – login “” – pass “a” 7 of 20
[ATTEMPT] target 192.168.3.10 – login “” – pass “123” 8 of 20
Which is most likely taking place here?
A) Ping sweep of the 192.168.3.10 network
B) Remote service brute force attempt
C) Port scan of 192.168.3.10
D) Denial of service attack on 192.168.3.10
B
To attack her hapless victim, Hacker Heather had to have a terminal window open to perform her hacking. While typing at the command-line, she had to enter several of her own passwords in plaintext in order to access some of her tools. When she was done doing her dirty deeds, which file should she clean in order to clear her passwords?
A) .xsession-log
B) .bashrc
C) .bash_history
D) .profile
C
Which type of rootkit sits undetected in the core of an operating system?
A) Firmware rootkit
B) Kernel rootkit
C) Hardware rootkit
D) Hypervisor rootkit
B
Which password cracking technique takes the longest time and most effort?
A) Dictionary attack
B) Shoulder surfing
C) Brute force
D) Rainbow tables
C
Which type of password cracking technique would feed a list of common passwords into a cracking application in an attempt to gain access to a user’s account?
A) Known plaintext
B) Brute force
C) Password spraying
D) Dictionary
D
On a Linux system you can hide files by starting the file’s name with which of these characters?
A) Tilde (~)
B) Period (.)
C) Underscore (_)
D) Exclamation mark (!)
B
Which technique provides ‘security through obscurity‘ by hiding secret messages within ordinary messages?
A) Encryption
B) RSA algorithm
C) Steganography
D) Public-Key cryptography
C
Which of these programming languages is commonly vulnerable to buffer overflows?
A) C#
B) C++
C) Python
D) Java
B
You breached a system and got the password hashes. You need to use these passwords to log on to systems, but you don’t have time to crack the hashes to find the passwords. Which type of attack could you use instead?
A) Pass the hash
B) Pass the ticket
C) LLMNR/NBT-NS poisoning
D) Internal monologue attack
A
Note: If you get someone’s hash, you don’t even need to crack it to log-on to a Windows network. You can just transmit (pass) the hash to the server you want to log-on to. Metasploit (and other tools) has a pass-the-hash module for doing this. Defenses for this include 1) not letting an attacker get your hashes in the first place, 2) Multi-factor authentication, 3) Network segmentation, etc.
If you boot a Windows machine with an Ubuntu Live CD, which Linux command-line tool can change user passwords and activate disabled accounts in the SAM file of the Windows machine?
A) SET
B) CHNTPW
C) Cain & Abel
D) John the Ripper
B
After gaining control to a user account, how can you gain access to another user account’s confidential files and data?
A) Port scanning
B) Hacking Active Directory
C) Shoulder-surfing
D) Privilege Escalation
D
Note: Once you gain access to a user account, a successful privilege escalation attack could allow you to gain the rights of another user or admin.
As an admin, how can you protect your password files against rainbow tables?
A) Password salting
B) Use of non-dictionary words
C) All uppercase character passwords
D) Lockout accounts under brute force password cracking attempts
A