Section 3.2 Flashcards

1
Q

One of the most important skills a hacker can have.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is the art of convincing people that you are worthy of knowing information and you have the ability to convince someone you are who you say you are.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two techniques to gain information
1.
2.

A
  1. Shoulder surfing

2. Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Looking over someone’s shoulder and watching what they are doing. Watch and see where their fingers go when typing a password. You have to know how to not get caught.

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phone phreaker love to look outside of phone companies in the what?

A

Dumpster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unless you are trespassing on someone’s land you are allowed to dumpster dive. When the trash is taken to the curb anyone can go through it. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

He went into blockbuster and pretended he was from corporate and trying to fix their problem. They tell him their isn’t a problem and he gives them his card and then goes home and creates the problem . They call him and he goes back to “fix” the problem and gets the users username and password and then he goes through user records and all their information. Who did this?

A

Kevin Mitnick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You create a fake situation in order to advance some agenda.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Way to get through physical security. Example: if you walk right behind someone the human instinct is to hold the door. This is known as what?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Get a heavy box and act like you cannot get into your pocket to get your card swipe out. This is known as what?

A

Tailgating from the front

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any time you find something wrong with a system.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL injection is a what?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero-day vulnerability is something that no one knows about yet but you. There are trophies of the zero-day vulnerabilities.

A

Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Downloaded or hacked software can be referred to the exploits that people code and give it to my buddies.

A

“Warez”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

People who are expected to be there.

A

Internal hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Everyone else on the network that is not expected to be there?

A

External hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IF you work at the bank and attack the bank.

A

Internal hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IF you don’t work at the bank and you attack the bank

A

External hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Most attacks are internal or external?

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most attacks are internal. True or False

A

True

21
Q

IT person who knows they are about to get fired is a potential hacker.

A

True

22
Q

Most companies spend more time trying to prevent external hacks when they need to spend more time on internal. True or False

A

True

23
Q

Me and you

A

Non-Nation State

24
Q

Military Organizations

A

Nation States

25
Q

STUXNET is a Nation State Hacker. True or False

A

True

26
Q

One of the most complicated viruses in human history. Created by a nation state as an attack on another nation state. Created to attack Iranian nuclear facilities.

A

STUXNET

27
Q

If a normal person were to create a hack it would be considered a non-nation state. True or False

A

True

28
Q

Hackers who steal money and steal information. All the negative stuff

A

Black Hats

29
Q

Work for companies, bug hunters, try to fix things

A

White Hats

30
Q

In the middle between good hackers and bad hackers

A

Gray Hats

31
Q

The division between hackers comes form what?

A

Westerns

32
Q

Good cowboy vs. Bad Cowboy depending on the type of hat they wore.

A

White Hat vs. Black Hat

33
Q

Who are hackers?

A

Age
Race
Education
Gender

34
Q

Stereotype hackers are what

A

Young
White
Educated
Males

35
Q

Compared to other criminals’ hackers are younger, more likely to be white, more educated, and more likely to be female. Hacking is still a majority male crime, but it is less majority than street crime. True or False

A

True

36
Q

Hackers are more likely to be _______.

A

Female

37
Q

The majority of hackers are still ______ but there are more _______ than street crimes.

A

Male

Female

38
Q

Anonymous is the most famous what?

A

hacking group

39
Q

Very organic, changes everyday, hierarchical, support for each other, and provide competition to accomplish goals.

A

Anonymous

40
Q

DEF Con in Las Vegas is a what?

A

Hacking Convention

41
Q

Hackers have to have a certain level of secrecy but hey love talking to other hackers. True or False

A

True

42
Q

Love for their devices. They love the newest technology and want to figure out how everything works.

A

Hackers in the hacking community

43
Q

The most help someone will give you is someone pointing you to the Manuel, but you have to do it yourself. A hacker will not walk you through each step. True or False

A

True

44
Q

If you want to be elite you have to do the work yourself this means putting in the _____ time.

A

Study

45
Q

If you can show you are able to do this it shows that you have taken the time to figure it out and you have mastered it. It gains you status in the hacking community. This demonstrates what?

A

Demonstration of mastery

46
Q

Hackers can have secrecy by using what?

A

Handles

47
Q

Names given to people so they font have to use their real name. It is extremely important to a hacker.

A

Handles

48
Q

Technology

Knowledge and Secrecy are three things that the ______ community values.

A

Hacker