ethical final

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/256

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:46 AM on 5/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

257 Terms

1
New cards
Front
Back
2
New cards
What is a DoS attack?
Denial-of-Service attack that reduces restricts or prevents accessibility of system resources to legitimate users
3
New cards
What is a DDoS attack?
Distributed DoS using multiple compromised systems (botnet) to flood a target
4
New cards
What are the three basic categories of DoS attack vectors?
Volumetric attacks; Protocol attacks; Application layer attacks
5
New cards
What is a UDP flood attack?
Attacker sends spoofed UDP packets at high rate to random ports causing server to check for non-existent applications
6
New cards
What is an ICMP flood attack?
Attacker sends large volumes of ICMP echo request packets with spoofed source addresses to saturate victim bandwidth
7
New cards
What is a Ping of Death attack?
Sending malformed or oversized ICMP packets exceeding 65535 bytes to crash or freeze target system
8
New cards
What is a Smurf attack?
Attacker spoofs victim's IP and sends ICMP ECHO requests to broadcast network causing all hosts to reply to victim
9
New cards
What is an NTP amplification attack?
Using botnet to send spoofed UDP packets to NTP server with monlist command enabled generating large response packets
10
New cards
What is a SYN flood attack?
Exploiting TCP three-way handshake by sending SYN requests with fake IPs filling victim's listen queue
11
New cards
What is a Fragmentation attack?
Flooding target with fragmented TCP/UDP packets that consume excessive resources during reassembly
12
New cards
What is a Spoofed Session Flood attack?
Creating fake TCP sessions with multiple SYN/ACK/RST/FIN packets to bypass firewalls and exhaust resources
13
New cards
What is an HTTP GET/POST attack?
Using time-delayed headers or incomplete message bodies to maintain HTTP connections and exhaust web server resources
14
New cards
What is a Slowloris attack?
Sending partial HTTP requests to keep connections open exhausting target server's maximum concurrent connection pool
15
New cards
What is a Multi-vector DDoS attack?
Using combinations of volumetric protocol and application-layer attacks launched sequentially or in parallel
16
New cards
What is a Peer-to-Peer attack?
Instructing P2P file sharing clients to disconnect and connect to victim's fake website using DC++ protocol flaws
17
New cards
What is a Permanent DoS or Phlashing attack?
Attacks causing irreversible hardware damage requiring replacement using fraudulent hardware updates
18
New cards
What is a TCP SACK panic attack?
Sending malformed SACK packets with low MSS to exploit Linux kernel integer overflow causing kernel panic
19
New cards
What is a DRDoS attack?
Distributed Reflection DoS using intermediary hosts to reflect attack traffic to target making source harder to trace
20
New cards
What tool is ISB (I'm so bored)?
Software utility for performing HTTP UDP TCP and ICMP flood attacks
21
New cards
What tool is UltraDDOS-v2?
GUI tool for entering target IP port and packet count to launch DDoS attacks
22
New cards
What tool is HOIC?
High Orbit Ion Cannon - HTTP-based DDoS attack tool
23
New cards
What tool is LOIC?
Low Orbit Ion Cannon - TCP/UDP/HTTP flood attack tool
24
New cards
What tool is HULK?
HTTP Unbearable Load King - generates unique requests to evade caching for DoS
25
New cards
What tool is UFONet?
Abuses OSI layer 7 using HTTP methods to launch DDoS via botnet of compromised web servers
26
New cards
What is Activity Profiling detection?
Monitoring average packet rate for network flows to detect abnormal deviations indicating attacks
27
New cards
What is Sequential Change-Point Detection?
Using Cusum algorithm to isolate changes in traffic statistics caused by attacks
28
New cards
What is Wavelet-Based Signal Analysis?
Filtering anomalous traffic flow input signals from background noise using spectral component analysis
29
New cards
What is Absorbing the Attack countermeasure?
Using additional capacity/bandwidth to absorb attack traffic requiring preplanning
30
New cards
What is Degrading Services countermeasure?
Identifying critical services to maintain while stopping non-critical services during attack
31
New cards
What is Shutting Down Services countermeasure?
Temporarily disabling all services until attack subsides
32
New cards
What is Egress Filtering?
Scanning headers of IP packets leaving network to prevent malicious traffic from exiting internal network
33
New cards
What is Ingress Filtering?
Preventing source address spoofing of Internet traffic entering network
34
New cards
What is TCP Intercept?
Router feature that intercepts and validates TCP connection requests to protect against SYN flooding
35
New cards
What is Rate Limiting?
Controlling rate of outbound or inbound traffic on network interface to reduce high-volume DDoS traffic
36
New cards
What is Black Hole Filtering?
Discarding packets at routing level without informing source that data didn't reach recipient
37
New cards
What is Load Balancing mitigation?
Distributing traffic across multiple servers to absorb additional attack traffic and provide failsafe protection
38
New cards
What is Throttling mitigation?
Setting routers to control incoming traffic levels to safe rates preventing server damage
39
New cards
What is Drop Requests mitigation?
Servers/routers dropping packets when load increases making requester solve puzzle before continuing
40
New cards
What is Traffic Pattern Analysis forensics?
Analyzing traffic patterns to develop new filtering techniques and update countermeasures
41
New cards
What is Packet Traceback forensics?
Reverse engineering technique to identify true source of attack for blocking further attacks
42
New cards
What is Event Log Analysis forensics?
Analyzing logs to identify source type and combination of DDoS attacks used
43
New cards
What is Cisco IPS Source IP Reputation Filtering?
Using reputation database to filter DoS traffic from known botnets and malware sources
44
New cards
Where are Windows password hashes stored?
SAM database or Active Directory database (never in clear text)
45
New cards
What command extracts SAM password hashes?
pwdump7 or Mimikatz
46
New cards
What is NTLM authentication protocol?
Microsoft protocol storing password hashes in SAM using hashing methods for authentication
47
New cards
What is Kerberos authentication?
Stronger Microsoft authentication protocol using KDC AS TGS and tickets for client/server applications
48
New cards
What is a Dictionary Attack?
Loading dictionary file into cracking application to try passwords against user accounts
49
New cards
What is a Brute-Force Attack?
Trying every combination of characters until password is broken
50
New cards
What is a Rule-based Attack?
Using attacker information about password to create customized rules for cracking
51
New cards
What command generates customized dictionary with John?
john --rules --wordlist=/path/to/rockyou.txt --stdout > /path/to/output.txt
52
New cards
What command cracks NTLM hashes with John?
john --format=NT /path/to/ntlm_hashes.txt
53
New cards
What is Hash Injection/Pass-the-Hash attack?
Injecting compromised hash into local session to validate network resources without cracking password
54
New cards
What is LLMNR/NBT-NS Poisoning?
Poisoning Windows name resolution to capture NTLMv2 hashes from victim authentication
55
New cards
What tool performs LLMNR/NBT-NS spoofing?
Responder
56
New cards
What is AS-REP Roasting?
Targeting Kerberos users without preauthentication to extract and crack TGT for password access
57
New cards
What command extracts AS-REP hashes?
GetNPUsers.py from Impacket suite
58
New cards
What is Kerberoasting?
Targeting service accounts in Active Directory to obtain and crack TGS ticket password hashes
59
New cards
What tool performs Kerberoasting?
Rubeus
60
New cards
What is Pass-the-Ticket attack?
Using stolen Kerberos TGT/ST tickets to authenticate without password using Mimikatz or Rubeus
61
New cards
What is NTLM Relay attack?
Intercepting and relaying NTLM authentication requests between client and server to impersonate client
62
New cards
What tools perform NTLM Relay?
Responder and ntlmrelayx
63
New cards
What command performs SSH brute force with Hydra?
hydra -l username -P wordlist.txt ssh://target_ip
64
New cards
What is password salting?
Adding random string to password before hashing to defeat pre-computed hash attacks
65
New cards
What is WES-NG?
Windows Exploit Suggester Next Generation - Python tool to discover exploits for Windows vulnerabilities
66
New cards
What command runs WES-NG?
wes systeminfo.txt (after running systeminfo > systeminfo.txt)
67
New cards
What is Metasploit Framework?
Exploit development platform supporting automated exploitation via known vulnerabilities and weak passwords
68
New cards
What command starts Metasploit?
msfconsole
69
New cards
What command generates payloads in Metasploit?
msfvenom
70
New cards
What is Exploit Module in Metasploit?
Basic module encapsulating exploit to target vulnerabilities across multiple platforms
71
New cards
What is Payload Module in Metasploit?
Establishes communication channel between Metasploit and victim host after successful exploit
72
New cards
What is Auxiliary Module in Metasploit?
Performs one-off actions like port scanning DoS fuzzing without exploitation
73
New cards
What is NOPS Module in Metasploit?
Generates no-operation instructions for blocking out buffers in exploits
74
New cards
What command generates NOP sled in Metasploit?
generate -t c 50 (for 50-byte C format NOP sled)
75
New cards
What is Encoder Module in Metasploit?
Encodes payloads to evade detection by antivirus IDS and security mechanisms
76
New cards
What is Evasion Module in Metasploit?
Modifies payload/exploit behavior to avoid detection by security systems
77
New cards
What is Post-exploitation Module in Metasploit?
Used after successful compromise to interact further with target system
78
New cards
What command shows available options in Metasploit?
show options
79
New cards
What command sets a payload in Metasploit?
set PAYLOAD payload_name
80
New cards
What command exploits a vulnerability in Metasploit?
exploit
81
New cards
What command backgrounds a session in Metasploit?
background
82
New cards
What command shows active sessions in Metasploit?
sessions
83
New cards
What command migrates a session in Metasploit?
migrate
84
New cards
What command kills a session in Metasploit?
kill
85
New cards
What is Nebula?
AI-powered tool using machine learning to help find vulnerabilities effectively
86
New cards
What is DeepExploit?
Fully automated AI tool using deep learning (A3C model) to identify and exploit vulnerabilities
87
New cards
What is malware?
Malicious software that damages/disables systems and gives control to creator for theft or fraud
88
New cards
What are examples of malware?
Trojans Backdoors Rootkits Ransomware Adware Viruses Worms Spyware Botnets Crypters
89
New cards
What is an Advanced Persistent Threat (APT)?
Network attack where attacker gains unauthorized access and remains undetected long-term to obtain sensitive information
90
New cards
What are APT lifecycle stages?
Preparation; Initial Intrusion; Persistence; Expansion; Search/Exfiltration; Cleanup
91
New cards
What is a Trojan?
Program containing malicious code inside apparently harmless program that gains control when user performs predefined actions
92
New cards
How do hackers use Trojans?
Delete OS files; Disable firewalls; Generate fake traffic; Record screenshots; Create backdoors; Use as botnet/proxy for attacks
93
New cards
What are Trojan infection steps?
Create packet (njRAT); Employ dropper/downloader; Employ wrapper; Employ crypter; Propagate via email/USB; Deploy; Execute damage routine
94
New cards
What is a virus?
Self-replicating program attaching to another program boot sector or document transmitted via downloads infected drives email attachments
95
New cards
What are virus infection indicators?
Constant antivirus alerts; Suspicious hard drive activity; Lack of storage space; Unwanted pop-ups
96
New cards
What are virus infection steps?
Create virus (JPS Virus Maker); Pack with binder; Send via email/chat/network; Execute on victim system
97
New cards
What is ransomware?
Malware restricting access to computer files/folders demanding online ransom payment to remove restrictions
98
New cards
What are ransomware families?
Mallox; Phobos; Xorist; LockBit Black; DarkSide; Conti; Cerber; Thanos; RansomEXX; NETWALKER; QNAPCrypt
99
New cards
What are ransomware infection steps?
Create with Chaos Builder; Transfer via email/physical media; Victim executes file; Files encrypted; Ransom note appears
100
New cards
What is a computer worm?
Malicious program independently replicating and spreading across network connections consuming resources without human interaction