Post Exam Material Flashcards

(84 cards)

1
Q

Is ScoutSuite open-scource?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ScoutSuite can

A

assess the security posture and perform security assessment on multiple cloud environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is ScoutSuite agentless?

A

Yes - it doesn’t require install or making changes to the cloud environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What format are Scoutsuite reports in?

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ScoutSuite can be used to check your cloud setup to make sure that it is

A

following best practices and any compliance standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Use cases for ScoutSuite are:

A

cloud security security auditing, performing compliance checks, intergration into CI/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Pivot lateral movement the initial compromised system is called the

A

foothold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is local port forwarding used for in a pivot?

A

to redirect traffic from a local system to remote system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is remote port forwarding used for in a pivot?

A

enables a remote system to connect to a local service on the user’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is dynamic port forwarding in a pivot?

A

it creates a dynamic tunnel that acts as a SOCKS proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is VPN pivoting?

A

A VPN is set up on a compromised machine. Allows the bypassing of IDS and firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is proxy pivoting?

A

Traffic routed through a proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy pivoting can capture?

A

credentials and cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the proxychains tool?

A

allows users route their internet traffic through multiple proxies to obfuscate their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

sshuttle is refered to as the

A

poorman’s VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sshuttle tool is used for

A

lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

sshuttle will not work on

A

Windows systems natively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The general syntax used for sshuttle

A

sshuttle -r user@remote-server 0.0.0.0/0 (-r = remote server, zeros IP address=route all traffic through)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Does sshuttle support DNS fordwarding?

A

Yes (–dns in the CLI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

sqlmap will automate

A

SQL injections with web pages and APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Karma attack is a variant of the

A

evil twin wireless attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Command to scan a network for ports, etc using metasploit is:

A

db_nmap [-xX]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

msfvenon option for different encoding

A

-e (helps to evade detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hydra option to stop when a password is found

A

-f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Wfuzz tool is for
web attacks
26
Wfuzz is used for
brute-forcing directories and files, API requests,
27
Which language is WPscan based on?
Ruby
28
Kerberoasting is an attack that
tries to get the password hash of an active directory account that has a service principle name(SPN) associated with it
29
SPN (service principle name) is an attribute (in AD) that associates an account with
a service on the network
30
How is an SPN used?
in Kerberos authentication for clients to obtain a ticket to access a service
31
In Kerberos anyone can request a ticket from the service being used that contains what?
password hash
32
Rubeus is a tool that can request what?
Kerberos service ticket
33
BeEF is to
exploit a web browser
34
Step one in BeEF is to
hook the target's browser
35
BeEF will execute what on the victums browser in hooking?
Java Script
36
BeEF tool can be used for:
Social Engeening attacks
37
Pass the Hash attack allows you to log into a system without knowing the
plain text password
38
Mimikatz can be used for what type of attack
pass the hash
39
Mimikatz can be used for
Credential dumping, Pass-the-Hash (PtH), Pass-the-Ticket (PtT), Over-Pass-the-Hash, Kerberos Ticket Extraction & Manipulation, Golden Ticket Attack, Silver Ticket Attack, SAM / LSA Secrets Dumping
40
Extracts plaintext passwords, NTLM hashes, and Kerberos tickets from memory (LSASS process).
Credential Dumping
41
Allows authentication using NTLM hash instead of plaintext password.
Pass-the-Hash (PtH)
42
Reuses Kerberos tickets (TGT/TGS) to impersonate users on the network.
Pass-the-Ticket (PtT)
43
Combines PtH and PtT by using an NTLM hash to request a Kerberos ticke
Over-Pass-the-Hash
44
Extracts, exports, and injects Kerberos tickets for lateral movement.
Kerberos Ticket Extraction & Manipulation
45
Creates forged Kerberos tickets using a domain’s KRBTGT account hash, granting domain admin access.
Golden Ticket Attack
46
Creates forged service tickets (TGS) for specific services within a domain.
Silver Ticket Attack
47
Airodump-ng is a
wireless packet capture and monitoring tool
48
aireplay-ng does what in the wireless attack?
deauthentication
49
aircrack-ng with a wordlist is used to
crack the password
50
Kismet tool is for
wireless attack
51
Is Kismet open source
Yes
52
What does Kismet do?
Sniffer, wardriver for capturing activity over Wi-Fi or Bluetooth
53
Does Kismet do active or passive scanning?
Passive
54
What do you use to analyse Kismet files
sqllite3
55
Prowler tool is for
Cloud-based attack
56
Prowler is used to assess
the cloud security posture of AWS environments
57
SpiderFoot is an open-source reconnaissance (OSINT) tool used to automate information gathering about a target — such as a
domain, IP address, email, username, subnet, or organization.
58
recon-ng is an open-source, modular
web reconnaissance framework (written in Python)
59
Power Tools is a collection of
Powershell scripts used for tasks like port scans and ping sweeps
60
Powersploit is a
post exploitation framework using script
61
Nishang is a set of offensive security powershell scripts
that can be used by red teams
62
theHarvester is used to gather open source intelligence (OSINT)
on a company or domain
63
Pin cylinder locks are the more common locks. They use a series of pins that
need to be aligned
64
Pin cylinder locks can be picked by the following techniques
single pin picking or raking
65
Disc detainer locks are higher security than
pin cylinder locks
66
Lever locks are more commonly used in
safes and older doors
67
Are wafer locks the simplest to pick
Yes
68
Warded locks are highly vulnerable to
skeleton keys
69
Auto jiggles are designed to bypass
wafer locks
70
Bump keys are modified keys that can open
pin tumbler locks
71
Enumeration activities: To find out the current username use
whoami command or printing out via username% variable with echo
72
Enumeration activities: View user privileges
whoami/priv
73
Enumeration activities: View local users
net user command
74
Nikto is a tool used to scan
web servers for potential security issues
75
Is Nikto good for preliminary assessments
Yes
76
Nitko scans can check for:
vulnerabilities and configuration errors
77
BloodHound collects and visualizes relationships within
Active Directory
78
SDP can be used for
network service discovery
79
Tools to scan certificate transparency logs (CT)
CTFR (command line tool) and crt.sh,
80
Hunter.io specializes in finding and verifying
professional email addresses
81
Is Hunter.io a web based or CLI tool?
Web based
82
CREST (Council of Registered Ethical Security Testers) is an international, not-for-profit organization that represents the cybersecurity industry, particularly focusing on
ethical penetration testing and cybersecurity testing services.
83
Censys.io is like
Shodan
84
Censys.io more advanced than
Shodan