Week 2 Flashcards
What do you do during the reconnaissance phase of the cyber kill chain?
Identify and select target
What do you do during the weaponisation phase of the cyber kill chain?
Preparing the payload
What do you do during the delivery phase of the cyber kill chain?
Find a way to deliver the payload, ex phishing
What do you do during the exploitation phase of the cyber kill chain?
You trigger the payload; could be dependent on user action (clicking the link)
What do you do during the Installation phase of the cyber kill chain?
Installation of a backdoor/RAT
What do you do during the Command and Control (C2) phase of the cyber kill chain?
Establish infrastructure to enable C2 access to the compromised host
What do you do during the Actions on objectives phase of the cyber kill chain?
You have full access so you fulfill your original objectives (ransom, data exfiltration)
What kind of attacks are explained by the cyber kill chain?
Adversarial attacks
What is enumeration?
Active; about scanning the target to know more about its technical properties
What is the first step of pentesting?
Info gathering
What step is after enumeration in pentesting?
Exploitation
What is priv esc?
Privilege escalation is about expanding system access, either horizontal (same access, different account) or vertical (different access, different account)
What is the equivalent of step 7 (Actions on objectives) in the cyber kill chain in pentesting?
Post-exploitation
What is a critique of the cyber kill chain?
Inflexible
What are infection vectors?
Paths taken to infect victims
What is the oldest type of infection vector?
Malicious attachments
What is the infection vector called when a user’s web browser makes them automatically download malicious content?
Drive-By download
What is the name of the function that creates malicious websites and make them appear high in the search lists?
Black Hat Search Engine Optimisation (SEO)
What are som pentesting linux distributions?
Kali, BlackBox, ParrotOS
What is the name of the online tool for searching devices connected to the internet?
Shodan
What is one of the benefits of using the Shodan database?
You don’t have to actively perform searches against a network
What are som linux commands that are useful for recon?
Dig, nslookup, traceroute, nc
What is metasploit?
A tool for exploiting vulnerable systems
What are the three components of Metasploit?
msfconsole
modules
tools
What is an exploit?
A code which uses a system vulnerability
What is a vulnerability?
A flaw in code, design or logic which can be exploited
What is a payload?
Some code which will run on the targeted system
What is an example of an online password-cracking tool?
Hydra
What is the difference between a brute force attack and a dictionary attack?
Brute force checks all possible combinations, a dictionary attack checks all entries in a list
What is a mask password attack?
Specify a password structure, much like a regular expression: basically just a more intelligent brute force attack
What is an important distinction between different password attacks?
Whether they are online or offline