Cisco - Ethical Hacker

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

Bind Shell 

sets up a listener on the target machine, waiting for an incoming connecting from the attacker system. 

2
New cards

nc -z <IP> <port range>

Used for port scanner

3
New cards

nc -lvp <port>

listen on a given TCP port.

4
New cards

nc -nv <IP> <port>

Connect to a TCP port

5
New cards

nc -lvp <port> > file.txt

Transfer a file

6
New cards

meterpreter - search

used to locate files osystemn the victim

7
New cards

meterpreter - Execute

used to run commands on the victim system

8
New cards

meterpreter - Shell

used to go into a standard shell on the victim system

9
New cards

meterpreter - Resource

used to execute Meterpreter commands listed inside a text file, which can help accelerate the actions taken on the victim system

10
New cards

C2 Utilities

Socat and Netcat

11
New cards

Convert Channel

Created by C2 with a system that has been compromised.

12
New cards

Living-off-the-land to perform directory listing, copy and moving files.

PowerShell

13
New cards

Empire

Open-source Framework to rapidly deploy post-exploitation modules.

14
New cards

WMI

Windows Management Instrumentation manages data and operations on Windows.

15
New cards

PsExec

Can modify Windows registry, execute scripts, and connect a compromised system to another system.(can execute anything that can run on Windows Command Prompt).

16
New cards

Living-of-the-land techniques

Empire, WMI, BloodHound, PowerShell, Sysinternals, WinRM, and PowerSploit

17
New cards

Enable-PSRemoting -SkipNetworkProfileCheck - Force.

WinRM

18
New cards

Vertical Privilege

lower privileged users access functions for higher-privileged users

19
New cards

NIST SP 800-88

A methodology after a penetration testing engagement is complete, all the systems should be cleaned up. Logs should be suppressed, user accounts deleted, and any files that were created as well. A secure deletion method may be preferred.

20
New cards

Wsc2 and TrevorC2

Python based C2 utilites

21
New cards

Mainting a Foothold in compromised system

creating and manipulating scheduled jobs and tasks, creating custom daemons and processes, creating new users, and creating a bind or reverse shell

22
New cards

NetBIOS-NS

for Name registration and resolution.

23
New cards

NetBIOS-DGM

for connectionless communication

24
New cards

NetBIOS-SSN

For connection-oriented communication

25
New cards

UDP Port 138

NetBIOS Datagram Service

26
New cards

UDP Port 137

NetBIOS Name Service

27
New cards

TCP Port 139

NetBIOS Session Service

28
New cards

TCP Port 135

MS-RPC (Microsoft Remote Procedure)

29
New cards

DNS Servers with BIND 9.5.0

Randomization of ports and provision of cryptographically secure DNS transaction identifiers

30
New cards

UDP Port 161

SNMP (Simple Network Management Protocol) used to manage network devices.

31
New cards

DNS Poisoning Attack

Manipulation of the DNS resolver cache by injecting corrupted DNS Data, which the DNS server sends the attacker IP to the victim.

32
New cards

SMTP Command “RSET”

Used to cancel an email transaction

33
New cards

SMTP Command “MAIL”

used to denote the email address of the sender

34
New cards

SMTP Command “EHELO”

used to initiate a conversation with an Extended Simple Mail Transport Protocol server

35
New cards

SMTP Command “DATA”

used to initiate the transfer of the contents of an email message

36
New cards

SMTP Command “STARTTLS”

used to start a Transport Layer Security connection to an email server

37
New cards

SMTP Command “HELO”

used to initiate an SMTP conversation with an email server

38
New cards

Reflected DOS

This attack uses spoofed packets that appear to be from the victim. Then the sources become unwitting participants in the attack by sending the response traffic back to the intended victim.

39
New cards

DNS Amplification

This an attack in which the attacker exploits vulnerabilities in target servers to initially turn small queries into much larger payloads, which are used to bring down the servers of the victim.

40
New cards

Direct DOS

This occurs when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.

41
New cards

DDOS

This attack uses botnets that can be manipulated from a command and control (CnC, or C2) system.

42
New cards

Route Manipulation Attacks

typically a BGP hijacking attack by configuring or compromising an edge router to announce prefixes that have not been assigned to the organization

43
New cards

Downgrade Attacks

the attacker forces a system to favor a weak encryption protocol or hashing algorithm that may be susceptible to other vulnerabilities

44
New cards

DHCP Starvation

an attacker floods a server with bogus DISCOVER packets until the server exhausts the supply of IP addresses

45
New cards

VLAN Hopping attack

an attacker bypass any layer 2 restrictions built to divide hosts

46
New cards

MAC address spoofing attack

an attacker spoofs the physical address of the NIC device to match the address of another on a network in order to gain unauthorized access or launch a Man-in-the-Middle attack

47
New cards

A characteristic of a Bluesnarfing Attack

An attack that can be performed using Bluetooth with vulnerable devices in range. This attack actually steals information from the victim's device. It can also be used to obtain a device's International Mobile Equipment Identity (IMEI) number.

48
New cards

MFP feature in the 802.11w protects against wireless attack

The 802.11w standard defines the Management Frame Protection (MFP) feature. MFP protects wireless devices against spoofed management frames from other devices that might otherwise deauthenticate a valid user session.

49
New cards

TCP Port 465

IANA (Internet Assigned Numbers Authority) for SMTP over SSL (SMTPS)

50
New cards

TCP Port 587

The Secure SMTP (SSMTP) protocol for encrypted communications, as defined in RFC 2487, using STARTTLS.

51
New cards

TCP Port 143

The default port used by the IMAP protocol in non-encrypted communications.

52
New cards

TCP Port 995

The default port used by the POP3 protocol in encrypted communications.

53
New cards

TCP Port 993

The default port used by the IMAP protocol in encrypted (SSL/TLS) communications.

54
New cards

TCP Port 25

The default port used in SMTP for non-encrypted communications.

55
New cards

TCP Port 110

The default port used by the POP3 protocol in non-encrypted communications.

56
New cards

Need to create a Silver ticket for kerberos silver ticket attack

need the system account (ending in $), the security identifier (SID) for the domain, the fully qualified domain name (FQDN), and the given service (for example, CIFS, HOST).

57
New cards

type of attack IP Spoofing is

The On-path attack intercepts communications between two systems. The attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server.

58
New cards

Common Mitigation for ARP cache Poisoning

Dynamic Address Resolution Protocol (ARP) Inspection (DAI) on switches to prevent spoofing of the Layer 2 addresses.

59
New cards

Type of attack Reflected DDos

An amplification attack is a form of reflected DoS attack in which the response traffic (sent by the unwitting participant) is made up of packets much larger than those initially sent by the attacker (spoofing the victim). The result is that the victim machine gets flooded by large packets for which it never actually issued queries, causing a denial of services.

60
New cards

best practices to help mitigate FTP server abuse and attacks

Disable anonymous logins.

Require re-authentication of inactive sessions.

Keep back-end databases on a different server than the FTP server.

Use FIPS 140-2 validated encryption ciphers for guidance on secure algorithms.

Keep FTPS/SFTP server software up-to-date.

Lock down admin accounts — limit admins, avoid common usernames, require MFA.

Use encryption at rest for all stored files.

Implement file/folder access controls so users only access what they should.

Use strong passwords and multifactor authentication with good credential management.

61
New cards

Web proxy devices provide

Enables HTTP transfer across firewall and support the caching of HTTP messages.

62
New cards

HTTP Status Code: 400

Related to Client Errors

63
New cards

HTTP Status Code: 500

Related to Server Errors

64
New cards

HTTP 2.0 improve performance over HTTP 1.1

Web Client can send multiple GET messages simultaneously. Multiplexing contributes to performance improvement, by compressing HTTP messages and tokens.

65
New cards

Mitigation for Session fixation attack

Encrypt an entire web session and exchanged only through an encrypted channel.

66
New cards

Persistent Cookie

Max-Age or Expires Attribute that is stored on a disk by the web browser until the expiration time.

67
New cards

Out-of-Band SQL Injection

attacker retrieves data using a different channel like email, text or an instant message that could be sent to the attacker with the query results.

68
New cards

Cookie configure with the HTTPOnly Flag

Forces the web browser to have this cookie processed only by the server, and attempting to access the cookie from client-based code or scripts is strictly forbidden.

69
New cards

mitigate against new deceives

Changing default manufacture password and restricting network access to critical systems to stop default credential attacks.

70
New cards

OWASP 3 prevention for XSS Attacks

Use attribute escape before inserting untrusted data into HTML common attributes, use HTML escape before inserting untrusted data into HTML element content, and use JavaScript escape before inserting untrusted data into JavaScript data values.

71
New cards

Best practice to mitigate lack of proper error handling in an app

Use well-thought-out scheme to provide meaningful error messages to the user but no useful information to an attacker.

72
New cards

watering hole

An attack is targeted when an attacker profiles websites that the intended victim accesses. The attacker then scans those websites for possible vulnerabilities.

73
New cards

elicitation

is the act of gaining knowledge or information from people.

74
New cards

The App Asterisk is for what

impersonate caller ID

75
New cards

Piggybacking

An unauthorized person tags along with an authorized person to gain entry to a restricted area, usually with the consent of the authorized person.

76
New cards

Tailgating

An unauthorized person tags along with an authorized person to gain entry to a restricted area, usually without the consent of the authorized person

77
New cards

Access Control mitigates two physical attacks

tailgating and piggybacking

78
New cards

VM Repository Vulnerability

is when a threat actor has found a way to upload fake or impersonated VMs with malicious software and backdoors.

79
New cards

Dagda

is a set of open-source static analysis tools that can help detect vulnerabilities, Trojans, backdoors, and malware in Docker images and container.

80
New cards

VM Escape Vulnerabilities

allows a threat actor to “escape” the VM and obtain access to other virtual machines on the system or access to the hypervisor.

81
New cards

GATTAcker

used to perform on-path attacks in Bluetooth Low-Energy (BLE) implementations.

82
New cards

Anchore’s Grype

An open-source container vulnerability scanner that can be used to find vulnerabilities in a Docker Image.

83
New cards

NIST SP 800-145

defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

84
New cards

Account Takeover

Threat actor gains access to a user or application account and uses it to access more accounts and information.

85
New cards

Nimbostratus

used to find vulnerabilities that could lead to metadata service attacks.

86
New cards

Cloud Malware Injection Attack

attacker created a malicious application and injects it into a SaaS, PaaS, or laaS environment.

87
New cards

Common data breaches against cloud assets

Insecure Permission configurations

88
New cards

Side-Chanel Attacks

often based on information gained from implementing the underlying computer system (or cloud environment) instead of a specific weakness in the implemented technology or algorithm.

89
New cards

Needle

Open-source framework used to test the security of IOS applications.

90
New cards

IPMI (Intelligent Platform Management Interface)

is a collection of compute interface specifications (often used by IoT systems) designed to offer management and monitoring capabilities independent of the host system’s CPU, firmware, and operating system.

91
New cards

CDKs (Cloud Development Kits)

help software developers and cloud consumers deploy applications in the cloud and use the resources that the cloud providers offers.

92
New cards

Cloud Providers minimize the impact of DoS or DDoS attacks

uses a distributed architecture

93
New cards
94
New cards
95
New cards