System Hacking Flashcards

1
Q

What is Path Interception?

A

Path interception is a method of placing an executable in a particular path in such a way that the application will execute it in place of the legitimate target. Attackers can exploit several flaws or misconfigurations to perform path interception like unquoted paths (service paths and shortcut paths), path environment variable misconfiguration, and search order hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Kernel Exploits?

A

Kernel exploits refer to programs that can exploit vulnerabilities present in the kernel to execute arbitrary commands or code with higher privileges. By successfully exploiting kernel vulnerabilities, attackers can attain superuser or root-level access to the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Web Shell?

A

A web shell is a web-based script that allows access to a web server. Web shells can be created in all OSs like Windows, Linux, MacOS, and OS X. Attackers create web shells to inject a malicious script on a web server to maintain persistent access and escalate privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Application Shimming?

A

Shims run in user mode, and they cannot modify the kernel. Some of these shims can be used to bypass UAC (RedirectEXE), inject malicious DLLs (InjectDLL), capture memory addresses (GetProcAddress), etc. An attacker can use these shims to perform different attacks including disabling Windows Defender, privilege escalation, installing backdoors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is GlitchPOS?

A

GlitchPOS is a fake cat game that is embedded in malware and not displayed at the time of execution. It is a Trojan targeting Point of Sale systems that masquerades as a cat game. When any victim installs the cat game, the Trojan will be executed in the background. GlitchPOS is used by attackers to grab the credit card information of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is BasBanke?

A

BasBanke is a Trojan family that runs on Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Scranos?

A

Scranos is a trojanized rootkit that masquerades as cracked software or a legitimate application, such as anti-malware, a video player, or an ebook reader, to infect systems and perform data exfiltration that damages the reputation of the target and steals intellectual property. When this rootkit executed, a rootkit driver is automatically installed, which then starts installing other malicious components into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Mirai?

A

Mirai is a self-propagating IoT botnet that infects poorly protected Internet devices (IoT devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Hypervisor-level Rootkit?

A

Hypervisor-level rootkits exploit hardware features such as Intel VT and AMD-V. These rootkits run in Ring-1, host the operating system of the target machine as a virtual machine, and intercept all hardware calls made by the target operating system. This kind of rootkit works by modifying the system’s boot sequence and gets loaded instead of the original virtual machine monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Kernel-level rootkit?

A

Kernel-level rootkit runs in Ring-0 with highest operating system privileges. These cover backdoors on the computer and are created by writing additional code or by substituting portions of kernel code with modified code via device drivers in Windows or loadable kernel modules in Linux. If the kit’s code contains mistakes or bugs, kernel-level rootkits affect the stability of the system. These have the same privileges of the operating system; hence, they are difficult to detect and intercept or subvert the operations of operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Application-level rootkit?

A

Application-level rootkit operates inside the victim’s computer by replacing the standard application files (application binaries) with rootkits or by modifying behavior of present applications with patches, injected malicious code, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In systems hacking, what is the ‘Executing Applications’ stage?

A

Once the attacker has administrator privileges, they can attempt to install malicious programs such as Trojans, backdoors, rootkits, and keyloggers, which grant them remote system access and enable them to remotely execute malicious codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In systems hacking, what is the ‘Escalating Privilege’ stage?

A

The attacker exploits known system vulnerabilities to escalate user privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In systems hacking, what is the ‘Gaining Access’ stage?

A

In system hacking, the attacker first tries to gain access to a target system using information obtained and loopholes found in the access control mechanism of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In systems hacking, what is the ‘Covering Tracks’ stage?

A

To remain undetected, it is important for the attackers to erase from the system all evidence of security compromise. To achieve this, they might modify or delete logs in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly