Certified Ethical Hacker (CEHv13) Module 01 Introduction to Ethical Hacking

0.0(0)
studied byStudied by 3 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/177

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

178 Terms

1
New cards

Non-Repudiation

A guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message

2
New cards

Elements of Information Security

1. Confidentiality

2. Integrity

3. Availability

4. Authenticity

5. Non-Repudiation

3
New cards

Confidentiliaty

Assurance that the information is accessible only to those authorized to have access

4
New cards

Integrity

The trustworthiness of data or resources in terms of preventing improper or unauthorized changes

5
New cards

Availability

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users

6
New cards

Entity

Something that is make use of a resource or communication channel

7
New cards

Hacking

Refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to a system

8
New cards

Hacker

A hacker refers to a person who breaks into a system or network without authorization to destroy, steal sensitive data, or perform malicious acts

9
New cards

Script Kiddie

Inexperienced hackers using premade scripts and tools without understanding them

10
New cards

White Hat Hacker

A professional in cybersecurity that increases security by conducting penetration tests and vulnerability assessments

11
New cards

Black Hat Hacker

Individuals with malicious intent who violate security

12
New cards

Grey Hat Hacker

Skilled hackers operating between ethical and unethical lines

13
New cards

Hacktivists

Politically or socially motivated individuals or groups

14
New cards

State Sponsored Hackers

Highly trained professionals working for government agencies

15
New cards

Cyber Terrorists

Extremists using cyber attacks to promote political or religious beliefs

16
New cards

Corporate Spies (Industrial Spies)

Individuals hired by companies to gather intelligence on competitors

17
New cards

Blue Hat Hackers

Security professionals hired temporarily to test systems before a product release

18
New cards

Red Hat Hackers

Vigilantes targeting black hat hackers using aggressive methods

19
New cards

Green Hat Hackers

Newcomers eager to learn hacking skills, often participating in online forums and communities

20
New cards

Suicide Hackers

Individuals who aim to bring down significant infrastructure for a cause and are not worried about facing jail time or other punishments

21
New cards

Hacker Teams

A consortium of skilled hackers having their own resources and funding. They work together for to search state of the art technologies and detect vulnerabilities.

22
New cards

Criminal Syndicates

Groups that are involved in organized and planned crime activities

23
New cards

Organized Hackers

A group of hackers working together in criminal activities

24
New cards

Authenticity

Refers to the characteristic of a communication, document, or any data that ensures the quality of being uncorrupted or

25
New cards

Information Security

The state of well-being of information and infrastructure in which the probability of theft, tampering, or disruption of information and services is kept low or tolerable

26
New cards

Attack

An action that is performed with the intent to breach an IT system's security by exploiting its vulnerabilities. It is the combination of a motive/goal, a method/TTP, and a vulnerability.

27
New cards

Motive/Goal

A motive originates out of the notion that a target system stores or processes something valuable, which leads to the threat of an attack on the system

28
New cards

Tactics, Techniques, and Procedures (TTPs)

The patterns and methods associated with a specific threat actor or group of threat actors

29
New cards

Tactic

A strategy followed by the attacker to carry out the attack

30
New cards

Technique

The technical methods used to carry out the attack

31
New cards

Procedures

The systematic approach the threat actors use to launch the attack

32
New cards

Vulnerability

A weakness in the design or implementation of a system that can be exploited to compromise the security of the system

33
New cards

Common Reasons Behind Vulnerabilities

1. Hardware or Software Misconfiguration

2. Insecure or Poor Design of Networks or Applications

3. Inherent Technological Weakness

4. End-User Carelessness

5. Intentional End-User Acts

34
New cards

Passive Attack

Does not interact with the target system or network

35
New cards

Active Attack

Interacts with the target system or network

36
New cards

Close-In Attack

The attacker is in close physical proximity to the target system or network

37
New cards

Insider Attack

Performed by trusted people who misuse and organization's assets

38
New cards

Disruption Attack

Attacker tampers with hardware or software prior to use or installation

39
New cards

Classifications of Attacks

1. Insider Attack

2. Disruption Attack

3. Close-In Attack

4. Active Attack

5. Passive Attack

40
New cards

Information Warfare (InfoWar)

Refers to the use of information and communication technologies (ICTs) to gain competitive advantages over a opponent

41
New cards

Command and Control Warfare (C2 Warfare)

The impact an attacker possesses over a network or system

42
New cards

Intelligence-Based Warfare

The design, protection, and denial of systems that seek sufficient knowledge to dominate the battlespace

43
New cards

Electronic Warfare

Use radio-electronic attacks to attack the physical means of sending information and use cryptographic attacks to disrupt the means of sending information

44
New cards

Psychological Warfare

Demoralize one's adversary to succeed in battle

45
New cards

Economic Warfare

Affect the economy of a business or country by blocking information flow

46
New cards

Cyberwarfare

Involves using information systems to attack virtual personas of an individual or group

47
New cards

Categories of Information Warfare (InfoWar)

1. Command and Control Warfare (C2 Warfare)

2. Intelligence-Based Warfare

3. Electronic Warfare

4. Psychological Warfare

5. Economic Warfare

6. Cyberwarfare

48
New cards

Defensive Information Warfare (InfoWar)

Strategies and actions to defend ICT assets against attacks

49
New cards

Offensive Information Warfare (InfoWar)

Strategies and actions to attack the ICT assets of an opponent

50
New cards

Ethical Hacking

The practice of employing computer and network skills in order to assist organizations in testing their network security for possible loopholes and vulnerabilities

51
New cards

To Hack

Describes the rapid development of new programs or the reverse engineering of existing software to make it better or more efficient in new and innovative ways

52
New cards

Cracker/Attacker

Refers to people who employ their hacking skills for offensive purposes

53
New cards

Ethical Hacker

Refers to security professionals who employ their hacking skills for defensive purposes

54
New cards

Reasons Why Organizations Recruit Ethical Hackers

1. Refers to security professionals who employ their hacking skills for defensive purposes

2. To uncover vulnerabilities in systems and explore their potential as a risk

3. To analyze and strengthen an organization's security posture, including policies, network protection infrastructure, and end-user practice

4. To provide adequate preventive measures in order to avoid security breaches

5. To help safeguard the customer data

6. To enhance security awareness at all levels in a business

55
New cards

Tiger Team

Works together to perform a full-scale test covering all aspects of the network, as well as physical and system intrusion

56
New cards

Framework for Performing a Security Audit of an Organization

1. Talk to client about the needs to be addressed during testing

2. Prepare and sign documents/contracts with client

3. Organize ethical hacking team and prepare the schedule for testing

4. Conduct the test

5. Prepare report analyzing the results of testing

6. Present the report to the client

57
New cards

Technical Skills of an Ethical Hacker

1. Knowledge of major operating environments

2. Knowledge of networking

3. A computer expert

4. Knowledge about security areas

5. High technical knowledge for launching sophisticated attacks

58
New cards

Non-Technical Skills of an Ethical Hacker

1. Ability to learn quickly

2. Strong work ethics, problem solving skills, communication skills

3. Committed to the organization's security policies

4. Awareness of local standards and laws

59
New cards

AI Driven Hacking

An approach to cybersecurity where AI technologies are used to enhance the capabilities of ethical hackers. It involves AI technologies, such as AI algorithms, machine learning models, and automation frameworks to facilitate and automate ethical hacking efforts.

60
New cards

Benefits of AI Driven Ethical Hacking

1. Efficiency

2. Accuracy

3. Scalability

4. Cost-Effectiveness

61
New cards

Ways AI Driven Hacking Helps Ethical Hackers

1. Automation of Repetitive Tasks

2. Predictive Analysis

3. Advanced Threat Detection

4. Enhanced Decision Making

5. Adaptive Learning

6. Enhanced Reporting

7. Simulation and Testing

8. Scalability

9. Continuous Monitoring

10. Adaptive Defense Mechanisms

62
New cards

ChatGPT-Powered AI Tools for Ethical Hacking

Tools that leverage the capabilities of OpenAI's ChatGPT model to revolutionize ethical hacking

63
New cards

Features of ChatGPT-Powered AI Tools for Ethical Hacking

1. Data Collection and Configuration

2. Real-Time Assistance and Task Automation

3. Integration with Threat Intelligence Databases

64
New cards

ShellGPT

A ChatGPT-Powered AI Tool that can help with generating and completing shell commands, writing code, and creating code comments and documentation

65
New cards

AutoGPT

A ChatGPT-Powered AI Tool that can automate task execution and data processing

66
New cards

WormGPT

A ChatGPT-Powered AI Tool that automates the generation of worm-like scripts and payloads

67
New cards

ChatGPT with DAN Prompt

A ChatGPT-Powered AI Tool that utilizes the Do Anything Now (DAN) prompt to enhance ChatGPT's properties

68
New cards

FreedomGPT

A ChatGPT-Powered AI Tool that bypasses content filters and restrictions, giving ethical hackers unrestricted access to AI

69
New cards

FraudGPT

A ChatGPT-Powered AI Tool designed to detect and prevent fraudulent activities

70
New cards

ChaosGPT

A ChatGPT-Powered AI Tool designed to simulate and understand chaotic and unpredictable behaviors

71
New cards

PosionGPT

A ChatGPT-Powered AI Tool used to introduce malicious models into otherwise trusted AI systems

72
New cards

HackerGPT

A ChatGPT-Powered AI Tool used to assist ethical hackers in identifying vulnerabilities

73
New cards

BurpGPT

A ChatGPT-Powered AI Tool that enhances BurpSuite's capabilities

74
New cards

BugBountyGPT

A ChatGPT-Powered AI Tool that is tailored for bug bounty hunters and provides tools and insights for identifying and reporting security vulnerabilities

75
New cards

PentestGPT

A ChatGPT-Powered AI Tool that assists penetration testers by automating aspects of the testing process

76
New cards

GPT White Hack

A ChatGPT-Powered AI Tool that provides tools to identify and mitigate security threats

77
New cards

CybGPT

A ChatGPT-Powered AI Tool that offers a wide range of features for enhancing security operations

78
New cards

BugHunterGPT

A ChatGPT-Powered AI Tool that assists in identifying and reporting bugs and vulnerabilities

79
New cards

Hacking APIs GPT

A ChatGPT-Powered AI Tool that focuses on identifying API vulnerabilities and providing tools to test and secure them

80
New cards

h4ckGPT

A ChatGPT-Powered AI Tool that assists ethical hackers

81
New cards

Ethical Hacker GPT

A ChatGPT-Powered AI Tool that provides tools and insights for ethical hackers

82
New cards

HackerNewsGPT

A ChatGPT-Powered AI Tool that provides real-time news and updates relevant to cyber professionals

83
New cards

GP(en)T(ester)

A ChatGPT-Powered AI Tool that assists ethical hackers

84
New cards

Examples of ChatGPT-Powered AI Tools

1. ShellGPT

2. AutoGPT

3. WormGPT

4. ChatGPT with DAN Prompt

5. FreedomGPT

6. FraudGPT

7. ChaosGPT

8. PoisonGPT

9. HackerGPT

10. BurpGPT

11. BugBountyGPT

12. PentestGPT

13. GPT White Hack

14. CybGPT

15. BugHunterGPT

16. Hacking APIs GPT

17. h4ckGPT

18. HackerNewsGPT

19. Ethical Hacker GPT

20. GP(en)T(ester)

85
New cards

CEH Ethical Hacking Framework Phases

1. Reconnaissance

2. Vulnerability Scanning

3. Gaining Access

4. Maintaining Access

5. Clearing Tracks

86
New cards

Reconnaissance

The preparatory phase in which an attacker gathers as much information as possible about the target prior to launching an attack

87
New cards

Passive Reconnaissance

When an attacker is using passive reconnaissance techniques, they do not interact with the target directly

88
New cards

Active Reconnaissance

Active reconnaissance techniques involve direct interactions with the target system

89
New cards

Scanning

Used to identify active hosts, open ports, and services enabled on particular hosts

90
New cards

Enumeration

Involves making active connections to a target system or subjecting it to direct queries

91
New cards

Vulnerability Scanning

The examination of the ability of a system or application, including its current security procedures and controls, to withstand assault

92
New cards

Gaining Access

The phase where the actual hacking occurs. Refers to the point at which the attacker obtains access to the operating system OS or applications on a computer or network.

93
New cards

Escalating Privileges

After gaining access to a system or low-privilege user account, the attacker may attempt to increase their privileges to the administrator level to perform protected system operations

94
New cards

Maintaining Access

The phase in which an attacker attempts to retain ownership of the system

95
New cards

Clearing Tracks

To remain undetected, attacker erase all evidence of a security compromise from the system

96
New cards

Cyber Kill Chain Methodology

1. Reconnaissance

2. Weaponization

3. Delivery

4. Exploitation

5. Installation

6. Command and Control

7. Actions on Objectives

97
New cards

Weaponization

Analyzes the data collected in the previous stage to identify the vulnerabilities and techniques that can exploit and gain unauthorized access to the target organization. Involves creating, but not executing the attack.

98
New cards

Delivery

After weapon is created, it needs to be delivered

99
New cards

Exploitation

After the weapon is delivered, it exploitation triggers the adversary's malicious code to exploit a vulnerability

100
New cards

Installation

After exploitation, adversary downloads and installs more malicious software on the target system to maintain access to the target network for an extended period