Section 3.2 Flashcards
One of the most important skills a hacker can have.
Social Engineering
It is the art of convincing people that you are worthy of knowing information and you have the ability to convince someone you are who you say you are.
Social Engineering
Two techniques to gain information
1.
2.
- Shoulder surfing
2. Dumpster diving
Looking over someone’s shoulder and watching what they are doing. Watch and see where their fingers go when typing a password. You have to know how to not get caught.
Shoulder Surfing
Phone phreaker love to look outside of phone companies in the what?
Dumpster
Unless you are trespassing on someone’s land you are allowed to dumpster dive. When the trash is taken to the curb anyone can go through it. True or False
True
He went into blockbuster and pretended he was from corporate and trying to fix their problem. They tell him their isn’t a problem and he gives them his card and then goes home and creates the problem . They call him and he goes back to “fix” the problem and gets the users username and password and then he goes through user records and all their information. Who did this?
Kevin Mitnick
You create a fake situation in order to advance some agenda.
Pretexting
Way to get through physical security. Example: if you walk right behind someone the human instinct is to hold the door. This is known as what?
Tailgating
Get a heavy box and act like you cannot get into your pocket to get your card swipe out. This is known as what?
Tailgating from the front
Any time you find something wrong with a system.
Vulnerabilities
SQL injection is a what?
Vulnerability
Zero-day vulnerability is something that no one knows about yet but you. There are trophies of the zero-day vulnerabilities.
Exploits
Downloaded or hacked software can be referred to the exploits that people code and give it to my buddies.
“Warez”
People who are expected to be there.
Internal hackers
Everyone else on the network that is not expected to be there?
External hackers
IF you work at the bank and attack the bank.
Internal hacker
IF you don’t work at the bank and you attack the bank
External hacker
Most attacks are internal or external?
Internal
Most attacks are internal. True or False
True
IT person who knows they are about to get fired is a potential hacker.
True
Most companies spend more time trying to prevent external hacks when they need to spend more time on internal. True or False
True
Me and you
Non-Nation State
Military Organizations
Nation States
STUXNET is a Nation State Hacker. True or False
True
One of the most complicated viruses in human history. Created by a nation state as an attack on another nation state. Created to attack Iranian nuclear facilities.
STUXNET
If a normal person were to create a hack it would be considered a non-nation state. True or False
True
Hackers who steal money and steal information. All the negative stuff
Black Hats
Work for companies, bug hunters, try to fix things
White Hats
In the middle between good hackers and bad hackers
Gray Hats
The division between hackers comes form what?
Westerns
Good cowboy vs. Bad Cowboy depending on the type of hat they wore.
White Hat vs. Black Hat
Who are hackers?
Age
Race
Education
Gender
Stereotype hackers are what
Young
White
Educated
Males
Compared to other criminals’ hackers are younger, more likely to be white, more educated, and more likely to be female. Hacking is still a majority male crime, but it is less majority than street crime. True or False
True
Hackers are more likely to be _______.
Female
The majority of hackers are still ______ but there are more _______ than street crimes.
Male
Female
Anonymous is the most famous what?
hacking group
Very organic, changes everyday, hierarchical, support for each other, and provide competition to accomplish goals.
Anonymous
DEF Con in Las Vegas is a what?
Hacking Convention
Hackers have to have a certain level of secrecy but hey love talking to other hackers. True or False
True
Love for their devices. They love the newest technology and want to figure out how everything works.
Hackers in the hacking community
The most help someone will give you is someone pointing you to the Manuel, but you have to do it yourself. A hacker will not walk you through each step. True or False
True
If you want to be elite you have to do the work yourself this means putting in the _____ time.
Study
If you can show you are able to do this it shows that you have taken the time to figure it out and you have mastered it. It gains you status in the hacking community. This demonstrates what?
Demonstration of mastery
Hackers can have secrecy by using what?
Handles
Names given to people so they font have to use their real name. It is extremely important to a hacker.
Handles
Technology
Knowledge and Secrecy are three things that the ______ community values.
Hacker