Week 2 Flashcards

1
Q

What do you do during the reconnaissance phase of the cyber kill chain?

A

Identify and select target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you do during the weaponisation phase of the cyber kill chain?

A

Preparing the payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you do during the delivery phase of the cyber kill chain?

A

Find a way to deliver the payload, ex phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you do during the exploitation phase of the cyber kill chain?

A

You trigger the payload; could be dependent on user action (clicking the link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you do during the Installation phase of the cyber kill chain?

A

Installation of a backdoor/RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you do during the Command and Control (C2) phase of the cyber kill chain?

A

Establish infrastructure to enable C2 access to the compromised host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you do during the Actions on objectives phase of the cyber kill chain?

A

You have full access so you fulfill your original objectives (ransom, data exfiltration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of attacks are explained by the cyber kill chain?

A

Adversarial attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is enumeration?

A

Active; about scanning the target to know more about its technical properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first step of pentesting?

A

Info gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What step is after enumeration in pentesting?

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is priv esc?

A

Privilege escalation is about expanding system access, either horizontal (same access, different account) or vertical (different access, different account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the equivalent of step 7 (Actions on objectives) in the cyber kill chain in pentesting?

A

Post-exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a critique of the cyber kill chain?

A

Inflexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are infection vectors?

A

Paths taken to infect victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the oldest type of infection vector?

A

Malicious attachments

17
Q

What is the infection vector called when a user’s web browser makes them automatically download malicious content?

A

Drive-By download

18
Q

What is the name of the function that creates malicious websites and make them appear high in the search lists?

A

Black Hat Search Engine Optimisation (SEO)

19
Q

What are som pentesting linux distributions?

A

Kali, BlackBox, ParrotOS

20
Q

What is the name of the online tool for searching devices connected to the internet?

A

Shodan

21
Q

What is one of the benefits of using the Shodan database?

A

You don’t have to actively perform searches against a network

22
Q

What are som linux commands that are useful for recon?

A

Dig, nslookup, traceroute, nc

23
Q

What is metasploit?

A

A tool for exploiting vulnerable systems

24
Q

What are the three components of Metasploit?

A

msfconsole
modules
tools

25
Q

What is an exploit?

A

A code which uses a system vulnerability

26
Q

What is a vulnerability?

A

A flaw in code, design or logic which can be exploited

27
Q

What is a payload?

A

Some code which will run on the targeted system

28
Q

What is an example of an online password-cracking tool?

A

Hydra

29
Q

What is the difference between a brute force attack and a dictionary attack?

A

Brute force checks all possible combinations, a dictionary attack checks all entries in a list

29
Q

What is a mask password attack?

A

Specify a password structure, much like a regular expression: basically just a more intelligent brute force attack

30
Q

What is an important distinction between different password attacks?

A

Whether they are online or offline

31
Q
A