Dion Training #2 Flashcards

(42 cards)

1
Q

hex code for directory traversal attack

A

%2E%2E%2F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is executing a script to inject a remote file into the web app or the website

A

Remote File Inclusion (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is adding a file to the web app or website that already exists on the hosting server

A

Local File Inclusion (LFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of web attack where an attacker tricks a victum into making an unwanted request

A

CSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of attack where the attacker tricks the server into making requests to unintended locations

A

SSRF (Server-Side Request Forgery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

responder command to enable a SMB relay attack

A

-r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC address is on which layer

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A shell where a listening port is opened on the victim’s machine is

A

Bind Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A command-line tool in Kali that is used to poison NetBIOS, LLMNR and mDNS name resolution requests

A

Responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Automated, all-in-one mobile application pentesting framework that can perform static and dynamic analysis

A

MobSF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Open-source tool that provides powerful capabilities for Pent Testing across various mobile operating systems

A

Frida

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which mobile tool can: Dump process memory, Perform in process fuzzing, detect anti-jailbreak and Alter a program;s behaviour

A

Frida

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mobile security tool that provides a comprehensive security and attack framework for Android

A

Drozer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Versatile command-line tool that allows testers to communicate with an Android device

A

Android Debug Bridge (ADB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______________________ is an open-source Python library (with a collection of example scripts) that implements low-level network protocols used by Microsoft Windows — things like SMB/CIFS, MS-RPC, DCE/RPC, NetBIOS, LDAP, Kerberos, NTLM, and others.

A

Impacket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Schedules Tasks and Cron Jobs are for which respective OS

A

Windows and Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Certificate stapling allows a webserver to perform certificate status checking instead of having the

A

browser perform the checking.

18
Q

Tool for misconfigured AD certificates services

19
Q

What is a master key that creates valid Kerberos tickets for any user, giving the ability to impersonate anyone in the domain

A

Golden Ticket

20
Q

Tool to use for Kerberos ticket manipulation

21
Q

A remote administration tool that allows users to execute processes on other systems

22
Q

A Critical vulnerability that allows attackers to run malicious code on a target system

A

Arbitrary Code Excution

23
Q

Tool that looks for security problems in Kubernetes clusters

24
Q

Tool that checks the Docker setup against best practice for securing Docker containers

25
To search for criteria — such as name, size, date, permissions, owner, or type you use the command
find
26
To find a string value you would use
grep
27
Parts of STRIDE
Spoofing Tampering REpudiation Information disclosure Denial-of-Service Elevation of Privilege
28
Octave is good to manage
organizational risks
29
Octave has how many phases and processes
3 phases and 8 processes
30
What is the method used by web browsers to automatically detect the presence of a proxy server ina network
WPAD
31
a tool used in penetration testing to exploit Bluetooth vulnerabilities and perform attacks like bluesnarfing and bluejacking
Bluecrack
32
the attack thst does not alter the messages but instead relays them between the parties,
relay attack
33
REST API uses the support document called
swagger
34
SOAP based services use the support document called
WSDL
35
Crontab formating start at minute progresses to
hour, day of the month, month, day of the week
36
A fraggle atttack is like a
DoS
37
RPC is the underlying mechanism for
DCOM
38
Black/Whiote Box analysis Brakeman and Wapiti
White / Black
39
EPSS score meaning
Low score least likely to be exploited
40
CVSS score meanign
Highest score most dangerous
41
LDAP injection you would use which tool
Burp Suite
42
Parameterized queries have what characters
%s