System Hacking Flashcards
Name 3 log-related methods of covering your tracks on a system hack
Disabling auditing
Clearing logs
Manipulating logs
What technique for covering tracks on network is Target system sends a request to the remote system to act on the response.
Reverse shell
What technique for covering tracks on network is Adding data payload to the target’s DNS server to create a back channel to steal information?
DNS tunneling
What technique for covering tracks on network is Using TCP parameters for payload distribution?
TCP parameters
What fields can you use to hide data in a TCP packet?
IP identification field
TCP acknowledgement number
TCP initial sequence number
What does the Privacy.sexy tool do?
Open source tool that can cleanup logs and personal activities.
What does the Auditpol tool do?
Microsoft tool to manipulate audit policies.
What does the MRU-blaster tool do?
Find and remove 30,000 Most Recently Used(MRU) lists.
What is the activity of Recovering passwords from the transmitted or stored data on computer systems?
Password Cracking
What is the non-electronic, passive method of password attack is Collecting information from the target’s trash bins?
Dumpster diving
What is the non-electronic, passive method of password attack is Observing the target while they type in their passwords?
Shoulder surfing
What is the non-electronic, passive method of password attack is Interacting with the target to trick them into revealing their passwords?
Social engineering
What kind of password attack is Load a dictionary file into a password cracking program and The program checks the passwords against user accounts?
Dictionary attack
What kind of password attack is Running every combination of characters until the password is cracked?
Brute-force attack
What kind of password attack is Taking a dictionary and expanding it with guesses using brute-force?
Hybrid attack
What kind of password attack is when Attacker combines several other attacks to crack the password and Used when the attacker has some information about the password?
Rule-based Attack
What kind of password attack is when attacker Guess passwords either by humans or by automated tools using dictionaries and Requires the attacker to manually attempt to log into the target’s machine?
Password guessing