Chapter 4: Hackers

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

hackers definition

unorthodox problem solver and master programmer

2
New cards

What is the popular consensus on hackers?

they are bad people who do bad things

**this is not entirely true...hackers do both good and bad (depending on what they use the hacking for)

3
New cards

CIA triangle

Confidentiality, Integrity, Availability

4
New cards

confidentiality

only certain people have the privilege to access info

5
New cards

integrity

cannot be easily corrupted, data has not been altered/changed

6
New cards

avaliability

if the data is available and when

7
New cards

hackers

an individual with a profound interest in computers and technology that has used this knowledge to access computer systems with or without authorization from the system owners

-explore computers or network-connected devices

legitimate access- no crime

hacker does not have permission- crime

8
New cards

Do all hackers engage in criminal activity?

no

9
New cards

system intrusion

when a hacker does not have permission to use a computer or network

10
New cards

range of activities hackers engage in

phone phreaking- 1970s to 1980s, breaking into telephone landline

software cracking- pirate software

social engineering- human confidence scam, dumpster diving

11
New cards

dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

(SSN, DOB, passwords, etc)

12
New cards

insider threat

cybercrimes who are from inside an organization present the highest risk for cybercrime and corporate and industrial espionage

-current/former employee, contractor or business partner

13
New cards

insider attack methods

-social engineering

-authorized use of an organization's systems

-bypassing security and control

-comprised accounts

14
New cards

crackers

Malicious hackers who break into computers for malicious purposes

15
New cards

script kiddies

do not have enough skill to write their own programs or explore new exploits themselves

-instead, they download attacks programs

16
New cards

hacktivists

the common characteristic of these people is the use of hacker skills and attitudes to convey a political message

17
New cards

black grey white

white hat

-ethical hackers

-employed

-maybe former grey or black hats

grey hat

-typically ethical but sometime violates ethics

-public disclosure

-self satisfying

black hat

-malicious

-anonymous

18
New cards

general hacking methods

typical attacker works in the following manner...

1. identify the target system

2. gathering info on the target system

3. finding a possible loophole in the target system

4. exploiting this loophole using exploit code

5. removing all traces from the log files and escaping without a trace

19
New cards

port scanning

scanning the target system

-normally the first step that an attacker undertakes

-is used to get a list of open ports, services, and the operating system running on the target system

-all this info can collectively prove to be invaluable when the attacker is actually trying to infiltrate into the target system

-can be performed easily using different methods

20
New cards

tools available for port scanning

-ping

-netstat

-McAfee SuperScan

*the easy usability and detailed info reports generated by popular port scanners has led to an alarming increase in the number of script kiddies

21
New cards

port scanning: counter-attack strategies

-it is impossible to stop clients from Port Scanning your network

examples...

-Scanlogd

-BlackICE

-Snort

-Abacus port sentry

**it is always advisable to disable as many services as possible....try to close as many ports as possible, without compromising on the services offered by that system

22
New cards

different types of hacking techniques

-social engineering (ex. phishing)

-compromised accounts (ex. weak passwords)

-web-based attacks (ex. SQL/command injection)

-malware (Trojan)

-keylogging

-eavesdropping/packet sniffing

-denial of service/distributed denial of service

-man in the middle

23
New cards

cross-site scripting

allows an attacker to embed malicious Javascript, HTML, or Flash into a vulnerable dynamic page to fool the user, executing the script on his machine in order to gather data

24
New cards

SQL injection

an attack technique used to exploit web sites that construct SQL statements from user-supplied input

25
New cards

denial of service (DOS) attacks

aimed at denying valid, legitimate Internet and Network users access to the services offered by the target system

-DOS attack is one in which you clog up so much memory on the target system that it cannot serve legitimate users

26
New cards

sniffers

capture all data packets being sent across the network in the raw form

-traffic monitoring

-network trouble shooting

-gathering info on attacker

-for stealing company secrets and sensitive data

*common example: Wireshark

27
New cards

countermeasures for sniffers

use encryption standards like SSL, SSH

28
New cards

key loggers

record all keystrokes made on that system and store them in a log file, which can later automatically be emailed to the attacker

29
New cards

countermeasures for key loggers

-periodic detection practices should be made mandatory

-a typical key logger automatically loads itself into the memory, each time the computer boots

-thus, the start up script of the key logger should be removed

30
New cards

trojans

act as a RAT (Remote Administration Tool), which allow remote control and remote access to the hacker