System Hacking Flashcards

1
Q

Mandatory Access Control (MAC)

A

Determine the usage and access policies of the users. Users can access a resource only if that particular user has the access rights to that resource. MAC finds its application in the data marked as highly confidential. The network administrators impose MAC, depending on the operating system and security kernel. It does not permit the end user to decide who can access the information, and does not permit the user to pass privileges to other users as the access could then be circumvented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discretionary Access Control (DAC)

A

Determine the access controls taken by any possessor of an object in order to decide the access controls of the subjects on those objects. The other name for DAC is a need-to-know access model. It permits the user, who is granted access to information, to decide how to protect the information and the level of sharing desired. Access to files is restricted to users and groups based upon their identity and the groups to which the users belong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Role Based Access Control (RBAC)

A

the access permissions are available based on the access policies determined by the system. The access permissions are out of user control, which means that users cannot amend the access policies created by the system. Users can be assigned access to systems, files, and fields on a one-to-one basis whereby access is granted to the user for a particular file or system. It can simplify the assignment of privileges and ensure that individuals have all the privileges necessary to perform their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rule-Based Access Control (RuBAC)

A

In rule based access control, the end point devices such as firewalls verifies the request made to access the network resources against a set of rules. These rules generally include IP addresses, port numbers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Meltdown vulnerability

A

This is found in all the Intel processors and ARM processors deployed by Apple. This vulnerability leads to tricking a process to access out-of-bounds memory by exploiting CPU optimization mechanisms such as speculative execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dylib hijacking

A

This allows an attacker to inject a malicious dylib in one of the primary directories and simply load the malicious dylib at runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spectre vulnerability

A

vulnerability is found in many modern processors such as AMD, ARM, Intel, Samsung, and Qualcomm processors. This vulnerability leads to tricking a processor to exploit speculative execution to read restricted data. The modern processors implement speculative execution to predict the future and to complete the execution faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DLL hijacking

A

In DLL hijacking attackers place a malicious DLL in the application directory; the application will execute the malicious DLL in place of the real DLL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Shimming

A

The Windows operating system uses Windows application compatibility framework called Shim to provide compatibility between the older and newer versions of Windows. An attacker can use these shims to perform different attacks such as disabling Windows defender, privilege escalation, installing backdoors, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scheduled task

A

Windows operating system includes utilities such as “at” and “schtasks.” A user with administrator privileges can use these utilities in conjunction with the task scheduler to schedule programs or scripts that can be executed at a particular date and time. If a user provides proper authentication, he can also schedule a task from a remote system using RPC. An attacker can use this technique to execute malicious programs at system startup, maintain persistence, perform remote execution, escalate privileges, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web shell

A

A web shell is a web-based script that allows access to a web server. Web shells can be created in all the operating systems like Windows, Linux, MacOS, and OS X. Attackers create web shells to inject malicious script on a web server to maintain persistent access and escalate privileges. Attackers use a web shell as a backdoor to gain access and control a remote server. Generally, a web shell runs under current user’s privileges. Using a web shell an attacker can perform privilege escalation by exploiting local system vulnerabilities. After escalating the privileges, an attacker can install malicious software, change user permissions, add or remove users, steal credentials, read emails, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Launch daemon

A

t the time of MacOS and OS X booting process, launchd is executed to complete the system initialization process. Parameters for each launch-on-demand system-level daemon found in /System/Library/LaunchDaemonsand/Library/LaunchDaemons are loaded using launchd. These daemons have property list files (plist) that are linked to executables that run at the time of booting. Attackers can create and install a new launch daemon, which can be configured to execute at boot-up time using launchd or launchctl to load plist into concerned directories. The weak configurations allow an attacker to alter the existing launch daemon’s executable to maintain persistence or to escalate privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access token manipulation

A

In Windows operating system, access tokens are used to determine the security context of a process or thread. These tokens include the access profile (identity and privileges) of a user associated with a process. After a user is authenticated, the system produces an access token. Every process the user executes makes use of this access token. The system verifies this access token when a process is accessing a secured object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Defend against malicious NTFS streams

A

To delete hidden NTFS streams, move the suspected files to FAT partition
Use third-party file integrity checker such as Tripwire File Integrity Monitor to maintain
integrity of NTFS partition files against unauthorized ADS
Use third-party utilities such as EventSentry or adslist.exe to show and manipulate
hidden streams
Avoid writing important or critical data to alternate data streams
Use up-to-date antivirus software on your system.
Enable real-time antivirus scanning to protect against execution of malicious streams
Use file-monitoring software such as Stream Detector (http://www.novirusthanks.org) and ADS Detector (https://sourceforge.net/projects/adsdetector/?source=directory) to help detect creation of additional or new data streams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hypervisor Level Rootkit

A

Exploiting hardware features such as Intel VT and AMD-V. These rootkits runs in Ring-1 and host the operating system of the target machine as a virtual machine and intercept all hardware calls made by the target operating system. This kind of rootkit works by modifying the system’s boot sequence and gets loaded instead of the original virtual machine monitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware/Firmware Rootkit

A

Hardware/firmware rootkits use devices or platform firmware to create a persistent malware image in hardware, such as a hard drive, system BIOS, or network card. The rootkit hides in firmware as the users do not inspect it for code integrity. A firmware rootkit implies the use of creating a permanent delusion of rootkit malware

17
Q

Kernel Level Rootkit

A

The kernel is the core of the operating system. Kernel level rootkit runs in Ring-0 with highest operating system privileges. These cover backdoors on the computer and are created by writing additional code or by substituting portions of kernel code with modified code via device drivers in Windows or loadable kernel modules in Linux.

18
Q

Boot Loader Level Rootkit

A

Boot loader level (bootkit) rootkits function either by replacing or modifying the legitimate bootloader with another one. The boot loader level (bootkit) can activate even before the operating system starts. So, the boot-loader level (bootkit) rootkits are serious threats to security because they can help in hacking encryption keys and passwords.

19
Q

BASH

A

The BASH or Bourne Again Shell is an sh-compatible shell which stores command history in a file called bash history. You can view the saved command history using more ~/.bash_history command. This feature of BASH is a problem for hackers as the bash_history file could be used by investigators in order to track the origin of an attack and the exact commands used by an intruder in order to compromise a system.

20
Q

Tcsh

A

This is a Unix shell and compatible with C shell. It comes with features such as command-line completion and editing, etc. Users cannot define functions using tcsh script. They need to use scripts such as Csh to write functions.

21
Q

Zsh

A

This shell can be used as an interactive login shell as well as a command-line interpreter for writing shell scripts. It is an extension of the Bourne shell and includes a vast number of improvements.

22
Q

Ksh

A

It improved version of the Bourne shell that includes floating-point arithmetic, job control, command aliasing, and command completion.

23
Q

Auditpol.exe

A

The command line utility tool to change Audit Security settings at the category and sub-category levels. Attackers can use AuditPol to enable or disable security auditing on local or remote systems and to adjust the audit criteria for different categories of security events.

24
Q

Clear_Event_Viewer_Logs.bat/clearlogs.exe

A

An utility that can be used to wipe out the logs of the target system. This utility can be run through command prompt, PowerShell, and using a BAT file to delete security, system, and application logs on the target system. Attackers might use this utility, wiping out the logs as one method of covering their tracks on the target system.

25
Q

SECEVENT.EVT

A

Attackers may not wish to delete an entire log to cover their tracks, as doing so may require admin privileges. If attackers are able to delete only attack event logs, they will still be able to escape detection.

26
Q

SECEVENT.EVT

A

The attacker can manipulate the log files with the help of: SECEVENT.EVT (security): failed logins, accessing files without privileges
SYSEVENT.EVT (system): Driver failure, things not operating correctly
APPEVENT.EVT (applications)

27
Q

Alternate Data Streams

A

that allows attackers to hide a file behind other normal files. Given below are some steps in order to hide file using NTFS:

Open the command prompt with an elevated privilege
Type the command “type C:\SecretFile.txt >C:\LegitFile.txt:SecretFile.txt”
(here, LegitFile.txt file is kept in C drive where SecretFile.txt file is hidden inside LegitFile.txt file)
To view the hidden file, type “more < C:\SecretFile.txt” (for this you need to know the hidden file name)