Module 6: System Hacking Flashcards

(45 cards)

1
Q

What is the primary objective of System Hacking in CEH?

A

To gain, escalate, maintain access to a target system and cover tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is meant by gaining access in System Hacking?

A

Obtaining the ability to authenticate to or execute on a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which phase follows Vulnerability Analysis in CEH methodology?

A

System Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common technique used to gain initial system access?

A

Password-based attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is password cracking?

A

Recovering plaintext passwords from hashed or encrypted values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is password guessing?

A

Attempting authentication using likely or common passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between online and offline password attacks?

A

Online attacks interact with live systems, offline attacks use stolen hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are weak passwords dangerous?

A

They allow attackers to gain unauthorized system access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is credential harvesting?

A

Collecting user credentials through technical or social means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a credential reuse attack?

A

Using credentials from one system to access another system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is password reuse a major security risk?

A

Compromise of one system can lead to multiple system breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by exploiting OS vulnerabilities?

A

Abusing known flaws in an operating system to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What role do unpatched systems play in system hacking?

A

They expose known vulnerabilities attackers can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a misconfigured service?

A

A service that violates security best practices or least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are misconfigurations commonly exploited?

A

They often bypass security controls without exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is privilege abuse?

A

Using excessive permissions granted to services or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the principle of least privilege?

A

Users and services should have only the permissions they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why is least privilege important for system security?

A

It limits the impact of a compromised account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is authentication protocol weakness exploitation?

A

Abusing flaws in authentication design rather than passwords

20
Q

Why are legacy authentication protocols risky?

A

They often lack strong encryption or mutual authentication

21
Q

What is trust exploitation in system hacking?

A

Abusing implicit trust between systems or users

22
Q

What is social engineering in the context of system hacking?

A

Manipulating users to gain system access

23
Q

Why is social engineering effective?

A

It targets human behavior instead of technical controls

24
Q

What is the role of human error in system hacking?

A

It can bypass strong technical security measures

25
What is physical access system hacking?
Gaining access through direct interaction with hardware
26
Why is physical access considered high risk?
It can bypass many logical security controls
27
What is the boot process attack conceptually?
Manipulating system startup to bypass authentication
28
Why is full disk encryption important?
It protects data if physical access is obtained
29
What is initial foothold in system hacking?
The first successful level of access to a system
30
Why is an initial foothold valuable to attackers?
It enables privilege escalation and persistence
31
What is the difference between access and privilege escalation?
Access grants entry, escalation increases permissions
32
What is post-exploitation access?
Expanding limited access into usable or persistent control
33
What is maintaining access?
Ensuring continued system access after initial compromise
34
What is persistence in system hacking?
The ability to retain access after reboot or logout
35
Why do attackers clear logs?
To avoid detection and forensic investigation
36
What is the purpose of clearing tracks?
To hide evidence of system compromise
37
Which CEH module focuses on gaining system access?
Module 6 – System Hacking
38
What security control best mitigates password attacks?
Strong authentication and credential management
39
What control reduces misconfiguration risk?
Secure configuration management
40
What control helps prevent exploitation of known vulnerabilities?
Patch management
41
What control reduces social engineering impact?
Security awareness training
42
What control limits damage after system access is gained?
Least privilege and monitoring
43
What is the CEH exam focus for system hacking techniques?
Understanding concepts, risks, and defenses
44
What does CEH test more: execution or recognition?
Recognition and understanding
45
What mindset does CEH expect when learning system hacking?
Think like an attacker to defend like a professional