Unit 11 - h Flashcards
What are two approaches to security?
- Secure things when the problems occur
- Proactive security measures
What is a Black Hat?
Someone who maliciously breaks into a system
What is a White Hat?
Someone who breaks systems without damaging and helps admin improve security.
What is a Grey Hat?
Someone who breaks ‘some’ systems (Idealogical motivation) or accidentally breaks in.
What are three hacking approaches?
- Technical Intrusions
- Social Engineering
- Brute Force
What is the main goal of hacking?
Privalage escaltion.
What is social engineering?
Social engineering uses social deception to make someone do something or reveal information.
What is brute force?
Brute forcing is when you make many attempts or repetitions of a process to break security.
What is DOS?
DOS is denial of service and is used to stop a service from running/functioning.
What is a SMURF attack? Describe the process.
A SMURF attack is when someone pings a broadcast address with a spoofed source address multiple times causing all the replies to go back to the spoofed machine which then can cause a DOS.
What is DDOS and what is one way this can be dealt with?
DDOS = Distributed Denial Of Service
Multiple machines are overtaken by a single machine using virus or trojan.
They are all commanded at once to ping a machine. This makes them hard to trace.
Best approach is to limit ‘syn’ packets.
What are the 5 problem areas that can be exploited?
- Inherent Security defects
- Misuse of legitimate tools
- Improper maintenance
- Ineffective security
- Inadequate detection system
Explain how/why inherit security defects can be exploited?
- Software is now so complex that it can be shipped with ‘unexpected features’
- These issues are publicly known
- Vendors have to release ‘fixes’
- Admins have to find time to update software
- Not all problems can be fixed such as a weak protocl.
Explain how/why legitimate tools can be misused?
ping - find victims
traceroute - trace network topologies
dig - DNS info
whois - background info on target
finger - who is logged in
rpcinfo - shows rpc servcies that are running
showmount - what NFS mounts are exported
telnet - interact with TCP protocol service
Explain how/why improper maintenance can be exploited?
- Critical updates being delayed or missed
- Lack of time/priority of admin