Random Flashcards
c:\type c:\badfile.exe > c:readme.txt:badfile.exe
Command to embed for NTFS streaming
start readme.txt:badfile.exe
Command to use hidden ADS file
httpd.conf
Sets apache web server status
Six stages of web server attack methodology
Information gathering, web server foot printing, website mirroring, vulnerability scanning, session hijacking, password cracking
server errors: 1XX
Informational: request recieved. processing
server errors: 2XX
success. received understood accepted
server errors: 3XX
Redirection. Further action must be taken to process
server errors: 4XX
Client error. Contains bad syntax or cannot be fulfilled
server errors: 5XX
Server error Failed to fulfuill apparently vailid request
DNS amplification attack
manipulating recursive DNS to DOS a target. Use of botnet to to amplify dns answers to the target
CSPP
Connection string parameter pollution injection attack that takes advantage osf web applications that use semi-colons ; to communicate with databases to separate parameters
Web attack tools
Burp Suite, WebScarab, HTTPrint,
VPN Protocol Authentication only, Whole packet. provides data integrity, data origin authentication, and an optional replay protection service. Data integrity is ensured by using a message digest that is generated by an algorithm such as HMAC-MD5 or HMAC-SHA. Data origin authentication is ensured by using a shared secret key to create the message digest. Replay protection is provided by using a sequence number field with the header. IT authenticates IP headers and their payloads, with the exception of certain header fields that can be legitimately changed in transit, such as the Time To Live (TTL) field.
AH (Authentication Header)
protocol provides data confidentiality (encryption) and authentication (data integrity, data origin authentication, and replay protection). Authentication mechanism authenticates only the IP datagram portion of the IP packet.
ESP Encapsulating Security Payload
Tunnel Mode
ESP tunnel mode encrypts the entire packet, including the original packet headers
Transport Mode
ESP transport mode only encrypts the data, not the original headers; this is commonly used when the sending and receiving system can “speak” IPsec natively.
Promiscuous Policy
This policy doesn’t impose any restrictions on the usage of system resources. for example, with a promiscuous net policy, there’s no restriction on net access. A user will access any web site, transfer any application, and access a laptop or a network from a foreign location. whereas this may be helpful in company businesses wherever people that travel or work branch offices need to access the structure networks, several malware, virus, and Trojan threats are present on the internet and because of free net access, this malware will return as attachments while not the data of the user. Network directors should be very alert whereas selecting this kind of policy
Permissive Policy
Policy begins wide-open and only the known dangerous services/attacks or behaviors are blocked. for instance, in a very permissive net policy, the bulk of net traffic is accepted, however many proverbial dangerous services and attacks square measure blocked. as a result of solely proverbial attacks and exploits are blocked, it’s not possible for directors to stay up with current exploits. directors are perpetually enjoying catch-up with new attacks and exploits. This policy ought to be updated often to be effective.
Prudent Policy
A prudent policy starts with all the services blocked. The administrator permits safe and necessary services singly. It logs everything, like system and network activities. It provides most security whereas permitting only proverbial however necessary dangers.
paranoid policy
A paranoid policy forbids everything. There’s a strict restriction on all use of company computers, whether or not it’s system usage or network usage. There’s either no net association or severely restricted net usage. Because of these to a fault severe restrictions, users typically try and notice ways that around them.
Hyena
Windows enumeration tool with GUI