Techniques Used by Hackers Flashcards

1
Q

White Hats

A

Good guy, ethical hackers, often hired by a company to test and improve security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Black Hats

A

Bad guys, crackers illegally using skills for malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gray Hats

A

In between white and black hats, too curious about tools and techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phases of ethical hacking

A

Recon->Scanning and enumeration->Gaining Access->Maintaining Access->Covering Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reconnaissance

A

Steps taken to gather evidence and info on target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active vs Passive Reconnaissance

A

Active: uses tools and techniques that may or may not be discovered, puts you at risk of discovery, E.G checking doors and gates or spear fishing.

Passive: Gathering info about your target without them knowing. Social Engineering, Dumpster diving, network sniffing, Google Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Passive recon tools

A

netcraft, archive.org, Google Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scanning and Enumeration

A

Gather more in depth info using info gathered during recon. running network mapper, vulnerability scanner, NMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gaining Access

A

Leverage attacks against the targets enumerated in phase 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maintaining Access

A

Hackers try to ensure that they have a back door into the system through the use of rootkits or trojans, the system can be used to launch further attacks or gather more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Covering Tracks

A

Disable,clear,alter,or corrupt log files. Delete temp files or folders, hide files with hidden attributes or directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sql Injection

A

When user input gets interpreted as sql code you can get yourself into real trouble, potentially allowing users to get access to your system or information about your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XSS

A

An attacker injects client-side script into web pages viewed by other users. Essentially crackers enter scripts into an area that other users interact with, when unsuspecting users go into that part of the site, the script runs rather the intended websites functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly