Module 6 System Hacking Flashcards

(68 cards)

1
Q

Define CEH.

A

Certified Ethical Hacker, a credential for professionals in ethical hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the first phase of the CEH hacking methodology?

A

The first phase is Reconnaissance, where information gathering occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false: Scanning identifies live hosts and services.

A

TRUE

Scanning helps in identifying vulnerabilities in the target systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: Gaining Access involves _______ exploiting vulnerabilities.

A

actively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does maintaining access mean in hacking?

A

It refers to creating a backdoor for future access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define covering tracks.

A

The process of erasing evidence of hacking activities to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering?

A

Manipulating individuals into divulging confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: Footprinting is part of the reconnaissance phase.

A

TRUE

Footprinting involves gathering information about a target’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of vulnerability assessment?

A

To identify and evaluate security weaknesses in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: Denial of Service attacks aim to _______ system availability.

A

disrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is exploitation in hacking?

A

The act of taking advantage of a vulnerability to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define post-exploitation.

A

Actions taken after gaining access to maintain control over the compromised system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of reporting in CEH?

A

To document findings and provide recommendations for improving security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: Network sniffing captures data packets traveling over a network.

A

TRUE

Sniffers can be used to intercept sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does password cracking involve?

A

Attempting to gain unauthorized access by guessing or recovering passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: SQL Injection is a type of _______ attack.

A

injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is malware?

A

Malicious software designed to harm or exploit any programmable device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define phishing.

A

A technique to trick individuals into revealing personal information via deceptive emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of firewalls?

A

To monitor and control incoming and outgoing network traffic based on security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or false: Encryption secures data by converting it into a readable format.

A

FALSE

Encryption transforms data into an unreadable format to protect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of intrusion detection systems (IDS)?

A

To monitor network traffic for suspicious activities and potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fill in the blank: Zero-day vulnerabilities are _______ known to the vendor.

A

not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is risk assessment?

A

The process of identifying, evaluating, and prioritizing risks to minimize impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define ethical hacking.

A

Legally testing systems for vulnerabilities to improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does **OSINT** stand for?
Open Source Intelligence, information collected from publicly available sources.
26
True or false: **Patch management** is crucial for maintaining system security.
TRUE ## Footnote Regular updates fix vulnerabilities and improve system resilience.
27
Define **brute force attack**.
A method of cracking passwords by trying all possible combinations until the correct one is found.
28
True or false: **Phishing** attacks use deceptive emails to steal passwords.
TRUE ## Footnote Phishing often involves fake websites to capture user credentials.
29
What is a **dictionary attack**?
A password cracking method that uses a list of common passwords and phrases.
30
Fill in the blank: **Keylogging** is a technique that records _______ typed on a keyboard.
keystrokes
31
Define **credential stuffing**.
An attack where stolen username-password pairs are used to access multiple accounts.
32
What is a **man-in-the-middle attack**?
An attack where the attacker intercepts communication between two parties to steal information.
33
True or false: **Social engineering** relies on manipulating people to gain access.
TRUE ## Footnote Techniques include impersonation and deception to extract sensitive information.
34
What does **password spraying** involve?
Attempting to access many accounts using a few common passwords.
35
Fill in the blank: **Rainbow tables** are used to reverse _______ hashes.
cryptographic
36
Define **session hijacking**.
An attack where an attacker takes control of a user session to gain unauthorized access.
37
What is **shoulder surfing**?
Observing someone’s screen or keyboard to steal passwords or sensitive information.
38
True or false: **Password reuse** increases the risk of account compromise.
TRUE ## Footnote Using the same password across multiple sites can lead to widespread breaches.
39
What is a **password manager**?
A tool that securely stores and manages passwords for various accounts.
40
Fill in the blank: **Two-factor authentication** adds an extra layer of _______ to password security.
protection
41
Define **brute force attack**.
A method of cracking passwords by systematically checking all possible combinations.
42
What is **credential harvesting**?
The process of collecting user credentials through various deceptive methods.
43
True or false: **Malware** can be used to steal passwords.
TRUE ## Footnote Types of malware include keyloggers and trojans designed for credential theft.
44
What is a **password policy**?
A set of rules designed to enhance security by enforcing strong password creation.
45
Fill in the blank: **Salting** passwords adds random data to make _______ more difficult.
hashing
46
Define **social engineering**.
Manipulating individuals into divulging confidential information for fraudulent purposes.
47
What is a **keylogger**?
A type of surveillance software that records keystrokes to capture sensitive information.
48
True or false: **Physical security** can prevent password attacks.
TRUE ## Footnote Securing devices and access points reduces the risk of unauthorized access.
49
What is **password complexity**?
The requirement for passwords to include a mix of letters, numbers, and symbols.
50
Fill in the blank: **Account lockout** policies help prevent _______ attacks.
brute force
51
Define **password expiration**.
A security measure requiring users to change their passwords after a set period.
52
What is a **security question**?
A question used to verify a user's identity, often during password recovery.
53
What is a **Trojan**?
A program that masks itself as a benign application but steals information or harms the system ## Footnote Attackers can gain remote access and perform operations limited by user privileges on the target computer.
54
Define **Spyware**.
A type of malware that secretly gathers information about users without their knowledge ## Footnote Spyware hides itself from the user and can be difficult to detect.
55
What is the function of a **keylogger**?
Records all user keystrokes without the user's knowledge ## Footnote Keyloggers send logs of user keystrokes to an attacker's machine or hide them for later retrieval.
56
True or false: A **keylogger** can reveal the contents of all user emails.
TRUE ## Footnote Keyloggers can capture sensitive information, including emails and passwords.
57
What is the purpose of installing a **Trojan/spyware/keylogger** on a victim's machine?
To collect usernames and passwords ## Footnote These programs run in the background and send back all user credentials to the attacker.
58
What is a **Hash Injection/Pass-the-Hash (PtH) Attack**?
An attack possible when the target system uses a hash function for authentication ## Footnote The system stores hash values of credentials in the SAM database/file on a Windows computer.
59
In a **Pass-the-Hash** attack, what does the server do with the user-submitted credentials?
Computes the hash value or allows the user to input the hash value directly ## Footnote The server checks it against the stored hash value for authentication.
60
What is the purpose of **LLMNR/NBT-NS** broadcast in ethical hacking?
To find out if anyone knows a specific host name ## Footnote This technique is used to discover network resources and can be exploited by attackers.
61
What happens when a user sends an **incorrect host name** during an LLMNR/NBT-NS broadcast?
The response indicates that the host is NOT FOUND ## Footnote For example, sending 'I\DtaServr' results in '1\DtaServr- NOT FOUND'.
62
In the LLMNR/NBT-NS poisoning attack, what does the **attacker** do after the user sends an incorrect host name?
The attacker responds claiming to know the host, accepts NTLMv2 hash, and sends an ERROR message ## Footnote This is part of the attack strategy to exploit the user's request.
63
What is the **Responder** tool used for in LLMNR/NBT-NS poisoning?
It is an LLMNR, NBT-NS, and MDNS poisoner that responds to specific queries ## Footnote By default, it responds to File Server Service requests for SMB.
64
What information can attackers extract using the **Responder** tool?
* Target system's OS version * Client version * NTLM client IP address * NTLM username * Password hash ## Footnote This information is critical for further exploitation of the network.
65
What is Rubeus?
This is the tool used by attackers to perform AS-REP Roasting (Cracking TGT) attacks.
66
What is Makrov-Chain Attack
In Makrov-Chain attack attackers gather a password database and split each password entry into two and three character syllables using these character elements. A new alphabet is developed which is then matched with the existing password database.
67
What is the initial phase of the Makrov-Chain Attack?
Attacker set a threshold parameter for the occurrences of the elements and only their letters present in the new alphabet that occurred at least the minimum number of times are selected.
68
What tools attackers use to detect hijackable DLLs and perform DLL hijacking?
Robber and PowerSploit