Network Defense and Countermeasures - Techniques Used by Hackers

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts and techniques discussed in Chapter 15: Techniques Used by Hackers.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

What is a white hat hacker?

A white hat hacker, also known as a pen-tester, hacks with the permission of the target system owners.

2
New cards

What is a black hat hacker?

A black hat hacker gains unauthorized access to a system with malicious intent, often referred to as a cracker.

3
New cards

What is a gray hat hacker?

A gray hat hacker typically abides by the law but may occasionally engage in illegal activities.

4
New cards

What does passively searching for information involve?

Gathering information without directly connecting to the target system, such as using tools like www.netcraft.com or http://archive.org.

5
New cards

What is active scanning?

Actively probing a target network to discover open ports, services, and vulnerabilities.

6
New cards

What activities are included in active scanning?

Port scanning (Ping, Connect, SYN, FIN scans) and Enumerating (finding computers, shared folders, and users).

7
New cards

What are some useful tools for identifying vulnerabilities?

Shodan.io, NSAuditor, FreeNetEnumerator, and Nmap.

8
New cards

What command is used for manual vulnerability scanning?

The telnet command.

9
New cards

What is involved in physical access attacks?

Bypassing the password using tools like OphCrack or tricking tech support.

10
New cards

What are some remote access attacks?

SQL injection and cross-site scripting (XSS).

11
New cards

What is SQL injection?

An attack that exploits vulnerabilities in a database by injecting malicious SQL code.

12
New cards

What is Cross-Site Scripting (XSS)?

An attack that injects client-side scripts into web pages viewed by other users.

13
New cards

How does bypassing the password work?

Boot to a Linux disc, access the Windows volume, backup the magnify application, replace Magnify.exe with cmd.exe, and reboot in Windows.

14
New cards

What is OphCrack?

A tool used to crack Windows passwords by booting the system in Linux and using rainbow tables to crack the SAM file.

15
New cards

How does SQL injection work?

By adding 'OR X=X' to the end of a password to bypass authentication if code is not well written.

16
New cards

What are some Wi-Fi hacking techniques?

Jamming, de-authentication, Wi-Fi Protected Setup (WPS) attacks, and cracking the password.

17
New cards

What is de-authentication in Wi-Fi hacking?

Sending a logoff packet to the WAP, spoofing the user’s IP address to trick them into logging back in through a rogue access point.