1/16
Flashcards covering key concepts and techniques discussed in Chapter 15: Techniques Used by Hackers.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a white hat hacker?
A white hat hacker, also known as a pen-tester, hacks with the permission of the target system owners.
What is a black hat hacker?
A black hat hacker gains unauthorized access to a system with malicious intent, often referred to as a cracker.
What is a gray hat hacker?
A gray hat hacker typically abides by the law but may occasionally engage in illegal activities.
What does passively searching for information involve?
Gathering information without directly connecting to the target system, such as using tools like www.netcraft.com or http://archive.org.
What is active scanning?
Actively probing a target network to discover open ports, services, and vulnerabilities.
What activities are included in active scanning?
Port scanning (Ping, Connect, SYN, FIN scans) and Enumerating (finding computers, shared folders, and users).
What are some useful tools for identifying vulnerabilities?
Shodan.io, NSAuditor, FreeNetEnumerator, and Nmap.
What command is used for manual vulnerability scanning?
The telnet command.
What is involved in physical access attacks?
Bypassing the password using tools like OphCrack or tricking tech support.
What are some remote access attacks?
SQL injection and cross-site scripting (XSS).
What is SQL injection?
An attack that exploits vulnerabilities in a database by injecting malicious SQL code.
What is Cross-Site Scripting (XSS)?
An attack that injects client-side scripts into web pages viewed by other users.
How does bypassing the password work?
Boot to a Linux disc, access the Windows volume, backup the magnify application, replace Magnify.exe with cmd.exe, and reboot in Windows.
What is OphCrack?
A tool used to crack Windows passwords by booting the system in Linux and using rainbow tables to crack the SAM file.
How does SQL injection work?
By adding 'OR X=X' to the end of a password to bypass authentication if code is not well written.
What are some Wi-Fi hacking techniques?
Jamming, de-authentication, Wi-Fi Protected Setup (WPS) attacks, and cracking the password.
What is de-authentication in Wi-Fi hacking?
Sending a logoff packet to the WAP, spoofing the user’s IP address to trick them into logging back in through a rogue access point.