Unit 11 - h Flashcards

1
Q

What are two approaches to security?

A
  • Secure things when the problems occur

- Proactive security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Black Hat?

A

Someone who maliciously breaks into a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a White Hat?

A

Someone who breaks systems without damaging and helps admin improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Grey Hat?

A

Someone who breaks ‘some’ systems (Idealogical motivation) or accidentally breaks in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are three hacking approaches?

A
  • Technical Intrusions
  • Social Engineering
  • Brute Force
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main goal of hacking?

A

Privalage escaltion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering?

A

Social engineering uses social deception to make someone do something or reveal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is brute force?

A

Brute forcing is when you make many attempts or repetitions of a process to break security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DOS?

A

DOS is denial of service and is used to stop a service from running/functioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SMURF attack? Describe the process.

A

A SMURF attack is when someone pings a broadcast address with a spoofed source address multiple times causing all the replies to go back to the spoofed machine which then can cause a DOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DDOS and what is one way this can be dealt with?

A

DDOS = Distributed Denial Of Service

Multiple machines are overtaken by a single machine using virus or trojan.

They are all commanded at once to ping a machine. This makes them hard to trace.

Best approach is to limit ‘syn’ packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 problem areas that can be exploited?

A
  • Inherent Security defects
  • Misuse of legitimate tools
  • Improper maintenance
  • Ineffective security
  • Inadequate detection system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain how/why inherit security defects can be exploited?

A
  • Software is now so complex that it can be shipped with ‘unexpected features’
  • These issues are publicly known
  • Vendors have to release ‘fixes’
  • Admins have to find time to update software
  • Not all problems can be fixed such as a weak protocl.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how/why legitimate tools can be misused?

A

ping - find victims

traceroute - trace network topologies

dig - DNS info

whois - background info on target

finger - who is logged in

rpcinfo - shows rpc servcies that are running

showmount - what NFS mounts are exported

telnet - interact with TCP protocol service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how/why improper maintenance can be exploited?

A
  • Critical updates being delayed or missed

- Lack of time/priority of admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain how/why ineffective security can be exploited?

A
  • Lack of security policy

- Trusted users might create scripts to bypass security

17
Q

Explain how/why lack of detection systems can be exploited?

A
  • Many sits rely on audit trails to detect problems

- This does nothing to protect against viruses, worms and trojans.

18
Q

What are the steps of a hack?

A
  • Casing
  • Scanning
  • Enumeration
19
Q

What is the process of casing?

A
  • Gather info on target

- Often called fingerprinting

20
Q

What is the process of scanning?

A
  • Making direct communication with machines to gather info

- Should include routers and firewalls as they can have remote config

21
Q

What is the process of enumartion?

A
  • Finding the actual access point/method
  • This can include a username and password.
  • It could be NFS or:
    - Null shares
    - Zone transfers
22
Q

Where are failed SSH logins stored and what can be done about many failed attempts?

A
  • /var/log/secure

- An iptables rule can be created to block the source IP