Theory Test 1 Flashcards
Hacker
General term for anyone who uses a computer to gain unauthorized access
Elite Hacker (Cracker)
Extensive knowledge of computers, well experienced
Black Hat, White Hat, Grey Hat?
Black: illegal, malicious
White: ethical hacker, legal (contracted, security tester)
Grey: illegal-ish, non-malicious
Script Kiddies
Not much knowledge, use programs from internet
Noob
New to hacking, almost no knowledge
Hacker Goals and Motivation
Goal: Steal, stop access, extort, destroy
Motive: Challenge, revenge, vandalism
Who created worms and started “hacking”?
Robert Tappan Morris
CIA
Confidentiality, Integrity, Availability
Confidentiality
Messages cannot be read (encryption)
Integrity
Assurance that data is not altered (hashing)
Availability
Network available to appropriate users (authentication)
AAA
Authentication, Authorization, and Accounting (systems)
TCP
Transmission Control Protocol
TCP/IP
Allows multiple apps to share same network connection and IP. Stack: 1. Network, 2. Internet, 3. Transport, 4. App
System and Registered Port Ranges
System: 0-1023
Registered: 1024-49151
Port 20&21
File Transfer Protocol (FTP)
Port 22
SSH, encrypted communication
Port 23
Telnet, unencrypted communication
Port 25
Simple Mail Transfer Protocol (SMTP)
Port 53
DNS
Port 80
HyperText Transfer Protocol (HTTP)
Port 110
Post Office Protocol 3 (POP3)
Port 143
Internet Message Access Protocol 4 (IMAP4)
Port 443
SSL & TLS, HTTPS
Ports 139 and 445
File sharing ports. 139: NetBIOS, 445: AD, windows shares
6 Possible TCP Flags
SYN, ACK, PSH, URG, RST, FIN
UDP
User Data Protocol
ICMP
Internet Control Message Protocol
Types of DoS/DDoS Attacks
Syn flood, ping flood, smurf attack, fraggle, LAND
SYN Flood
DoS, SYN requests are spammed, exploits 3-way handshake, server can’t accept new connections
Ping Flood
DoS, pings are spammed (ICMP echo requests), slows down computer. Command: ping __ -l (size in bytes) -t (continuous)
Smurf Attack
DDoS, send ping to broadcast address and spoof source, causing host to be flooded with ICMP echo replies
Fraggle Attack
DoS, send lots of spoofed UDP to router broadcast address
LAND Attack
Victim is sent packet with own IP in source and destination and same port for source and destination, causing continuous loop
Buffer Overflow Attack
Overflow a buffer with data that the extra data string could be passed to memory and run
SQL Injection Attack
Code injection technique, SQL statements are inserted into an entry field for execution
Netstat
Displays net connections for TCP and UDP protocols and network protocol statistics