Lesson 12 - Hackers Methodology

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Phase 1 - Footprinting

Using passive methods of gaining information about the target system prior to performing in the attack

-Internet or OSINT

-Social Engineering

-Dumpster Diving

-Mail Harvesting

2
New cards

Nslookup

Locate IP for domain name

3
New cards

Tracert

Locate network range

4
New cards

Ping

Confirm active machine

5
New cards

Whois

Locate domain name

6
New cards

Maltego

Information about network as well as internet infrastructure

7
New cards

Phase 2 - Scanning

Taking information obtained from phase 1 in order to attack more precisely; actively connects to the target system and get response to identify open ports and running services

8
New cards

Phase 2 - Enumeration

In-dept information gathering about a target: software versions, user accounts, DNS

9
New cards

NMAP

-Network scanner

-Discovers hosts and services on a computer network by sending packets and analyzing the responses

10
New cards

Nmap -sV

Detects service version

11
New cards

Nmap -O

Detect operating system

12
New cards

Phase 3 - Gaining Access

-Move from low-level account all the way up to administrator

-Social engineering, backdoors, trojans, web application vulnerabilities

13
New cards

Phase 4 - Covering Tracks and placing backdoors

Removal of evidence; install rootkits, backdoors, delete temp files and edit log files

14
New cards

MITRE ATT&CK

Knowledge base of adversary tactics and techniques based on real-world observation.