System Hacking Flashcards
explian the staps of network pivoting
1- dicover other hosts in the network
2- add a route to the internal network
3-ensure it was added to the routing table
4-auxiliray/scanner/portscan/tcp can be uses to determine open ports and wethere there are other host alive in a network
once a hacker gained unauthorized acess to system and esclate the privleges, it is time for____ and it is called ___
execute malicious application. it is called system owning or owning the system
why does a hacker excute applications?
- collect info
- gather detailed info by capturing keystrokes
- maintain acess
- crack password
what kind of malicious programs attackers execute on target system
- keyloggers
- spyware
- crackers
- backdoors
explain the steps of creating a backdoor
1- create the payload
2- uploading backdoor file
3-excuting backdoor
4- add entry in windows registery
what is the common tool used for creating backdoors?
msfvenom
msfvenom -p [payload] -f [format] LHOST=[your ip]
LPORT=[your listener port]
what are the objectives of rootkits?
- to root the host system and gain remote backdoor access
- to mask the attackers’ tracks and the presence of malicious application
what command/utitlity is used to disable audting?
auditpol.exe
what utlity is used for clearing logs?
clearlogs.exe