White/Black hats Flashcards

1
Q

What is a white hat hacker?

A

A white hat hacker is a computer security expert who uses their skills to identify and fix security vulnerabilities in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do white hackers do?

A

What hat hackers perform a variety of tasks including: reverse engineering malware and viruses, analysing security incidents to determine their root cause, scanning networks for vulnerabilities, designing plans to exploit vulnerabilities and then patching them, providing technical support, reviewing and updating documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a black hat hacker?

A

A black hat hacker is a cyber criminal who intentionally gains access to computer systems and networks for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do black hat hackers do?

A

Black hat hackers steal or destroy data, hold organisations to ransom, sell data to third parties, disrupt or shut down networks and websites and conduct cyber espionage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tools do hackers use?

A

Hackers use a variety of tools including: Wireshark, Aircrack-ng, Acunetix, Nikto, Sqlmap, Ettercap, Netsparker, Burp Suite, Kismet, Hashcat and fuzzers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is wireshark?

A

Wireshark analyses data packets and protocols and can export results to various file formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Aircrack-ng?

A

Aircrack-ng analyses Wi-Fi network security and can crack WEP and WPA-PSK in windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Acunetix?

A

Axunetix is an automated security testing tool that can detect threats like SQL injection and cross-site scripting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Nikito?

A

Nikito is an open source tool that analyses web servers to detect vulnerabilities, malicious files and outdated components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Sqlmap?

A

Sqlmap is an open source tool that automates the detection and exploitation of SQL injection vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Ettercap?

A

Ettercap is a tool that incorporates host and network analysis and can sniff SSH connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Netsparker?

A

Netsparker is a web application security scanner that identifies weaknesses in web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Burp Suite?

A

Burp Suite is a tool that helps detect security tests and is valuable for web application testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Kismet?

A

Kismet is a wireless sniffer tool that can detect networks, sniff packets and perform intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Hashcat?

A

Hashcat is an open source password cracking tool that guesses passwords, hashes them and compares the results to the one it is trying to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are fuzzers?

A

Fuzzers are tools that automatically feed programs with random or semi-random data to identify bugs and vulnerabilities.

17
Q

What are black box fuzzers?

A

Black box fuzzers have no knowledge of the program’s structure, so inputs are generated randomly. These are often used by cybersecurity researchers to find vulnerabilities in commercial products.

18
Q

What are white box fuzzers?

A

White box fuzzers use knowledge of the programs structure, logic and code to create inputs that systematically test the program. This can take longer to generate inputs but is good for finding deep bugs.

19
Q

What are grey box fuzzers?

A

Grey box fuzzers combine aspects of white box and black box fuzzing, often monitoring program execution to refine input generation.