Module 6 - System Hacking

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:16 PM on 2/25/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

What is the primary goal of system hacking in ethical hacking?

a. Exploiting vulnerabilities

b. Gaining unauthorized access to systems

c. Conducting social engineering attacks

d. Performing malware analysis

b. Gaining unauthorized access to systems

2
New cards

Which tool is commonly used for privilege escalation in Windows systems?

a. John the Ripper

b. Windows Exploit Suggester

c. Hashcat

d. Nikto

b. Windows Exploit Suggester

3
New cards

What is the purpose of the SAM file in Windows?

a. Stores user activity logs

b. Stores password hashes for user accounts

c. Manages system configuration

d. Serves as a backup directory

b. Stores password hashes for user accounts

4
New cards

Name a tool that can extract password hashes from the SAM file.

a. Cain & Abel

b. PwDump

c. Mimikatz

d. Netcat

b. PwDump

5
New cards

Which password-cracking tool supports GPU acceleration?

a. Hydra

b. John the Ripper

c. Hashcat

d. Recuva

c. Hashcat

6
New cards

What is the difference between a rootkit and a Trojan?

a. Rootkits exploit web vulnerabilities; Trojans steal passwords

b. Rootkits hide malicious activities; Trojans disguise malicious software as legitimate

c. Rootkits perform privilege escalation; Trojans spread viruses

d. Rootkits target file systems; Trojans target operating systems

b. Rootkits hide malicious activities; Trojans disguise malicious software as legitimate

7
New cards

Which tool is known as the “Swiss Army knife” of networking?

a. Netcat

b. Nikto

c. Wireshark

d. Metasploit

a. Netcat

8
New cards

What is the main purpose of steganography in system hacking?

a. Encrypting sensitive files

b. Hiding data within other files

c. Cracking password hashes

d. Monitoring network traffic

b. Hiding data within other files

9
New cards

Name a common tool used to analyze processes running on Windows systems.

a. Process Explorer

b. CoverMyTracks

c. Recuva

d. Hydra

a. Process Explorer

10
New cards

What is the function of Mimikatz in system hacking?

a. Captures network packets

b. Extracts plaintext credentials and hashes from memory

c. Scans for open ports

d. Deletes user activity logs

b. Extracts plaintext credentials and hashes from memory

11
New cards

Which command lists active network connections on a system?

a. ls

b. net user

c. netstat

d. ifconfig

c. netstat

12
New cards

What is the purpose of a reverse shell?

a. To list active services

b. To connect back to a compromised system

c. To capture user credentials

d. To detect vulnerabilities in a network

b. To connect back to a compromised system

13
New cards

Name a tool used to automate the deletion of attack traces on a compromised system.

a. CoverMyTracks

b. Nikto

c. Metasploit

d. Hashcat

a. CoverMyTracks

14
New cards

How does John the Ripper differ from Hydra?

a. John the Ripper is used for brute-force attacks; Hydra is for offline cracking

b. John the Ripper is for offline cracking; Hydra performs brute-force attacks on services

c. Both are used for network traffic analysis

d. Both are used for exploiting web vulnerabilities

b. John the Ripper is for offline cracking; Hydra performs brute-force attacks on services

15
New cards

Which tool can identify vulnerabilities for privilege escalation in Linux?

a. Windows Exploit Suggester

b. Linux Exploit Suggester

c. Nikto

d. Wireshark

b. Linux Exploit Suggester

16
New cards

What is the significance of the “Administrator” account in system hacking?

a. It is a high-privilege account targeted for complete control

b. It stores user credentials for all accounts

c. It logs system errors and warnings

d. It manages network traffic analysis

a. It is a high-privilege account targeted for complete control

17
New cards

Which Metasploit module is commonly used to create a persistent backdoor?

a. Auxiliaries

b. Exploits

c. Post-Exploitation Persistence

d. Payloads

c. Post-Exploitation Persistence

18
New cards

What type of vulnerabilities does the tool Cain & Abel target?

a. Web server misconfigurations

b. Network password recovery and ARP poisoning

c. SMB share enumeration

d. DNS spoofing attacks

b. Network password recovery and ARP poisoning

19
New cards

How can a rootkit evade detection on a compromised system?

a. By encrypting malicious files

b. By operating at the kernel level

c. By scanning for antivirus programs

d. By exploiting weak passwords

b. By operating at the kernel level

20
New cards

Name a common method used to maintain access to a hacked system.

a. Creating a reverse shell

b. Installing a rootkit

c. Adding backdoors or user accounts

d. Exploiting zero-day vulnerabilities

c. Adding backdoors or user accounts

21
New cards

Which tool is used to recover deleted files on a Windows system?

a. Recuva

b. CoverMyTracks

c. Process Explorer

d. Nikto

a. Recuva

22
New cards

What is the primary use of the Netstat command in system hacking?

a. To analyze active connections for suspicious activity

b. To scan for vulnerabilities

c. To enumerate user accounts

d. To retrieve password hashes

a. To analyze active connections for suspicious activity

23
New cards

What is the function of CoverMyTracks in ethical hacking?

a. Scans for open ports

b. Automates the clearing of logs and traces

c. Identifies weak credentials

d. Monitors running processes

b. Automates the clearing of logs and traces

24
New cards

Name a tool used to crack password hashes offline.

a. Hydra

b. Metasploit

c. Hashcat

d. Wireshark

c. Hashcat

25
New cards

How does Hashcat improve the efficiency of password cracking?

a. By running on low-power devices

b. By utilizing GPU acceleration

c. By combining multiple cracking techniques

d. By targeting dictionary-based attacks only

b. By utilizing GPU acceleration