CEH V11 Cheat Sheet 1, WGU Master's Course C701 - Ethical Hacking (Practice Exam 124q), Ethical Hacking - C701, Ethical Hacking - C701

¡Supera tus tareas y exámenes ahora con Quizwiz!

Serial

Uniquely identifys the certification

Optional fields

e.g Issuer ID, Subject Alt Name

CAN-SPAM

email marketing

Service (SRV)

hostname & port # of servers

URG

indicates data being sent out of band

SYN

initial comms. Parameters and sequence #s

Replay

intruder sends to the victim the same message as was already used in the victim's communication Perform in MITM repeat exchange to fool system in setting up a comms channel

Operator:

keyword additional search items

inurl:

keywords anywhere in url

Intitle:

keywords in title tag of page

FIN

ordered close to communications

DNS

port 53 nslookup (UDP), Zone Ofer (TCP)

frequency analysis

repeating characters/phrases

uncache:

search Google cache only

subject's public key

self-explanatory

trickery and deceiot

social engineering

Digital certificate

used to verify user identity = nonrepudiation version: identifies format. Common = V1.

related-key attack

using two keys

DNS footprinting

whois, nslookup, dig

PKI

A set of hardware, software, people, policies, and procedures needed for digital certificates.

RC4

A variable key size symmetric key stream cipher used in WPA and WEP.

ACK

Ack to, and after SYN

Algorithm ID

Algo

CNAME

Aliases in zone. list multi services in DNS

El Gamal

Asymmetric Algo. !=Primes, log problem to encrypt/sign

ECC

Asymmetric Algo. Elliptical Curve Cryptography. Low process power/mobile

Ciphertext-only attack

Attacker ONLY has access to the ciphertext of messages. Obtain several messages with same algorithm

Hierarchical

CA at top. RA's Under to manage certs

Single authority

CA at top. Trust based on CA itself

CVE

Common Vulnerabilities and Exposures

CVSS

Common Vulnerability Scoring System

SOX

Corporate Finance Processes

ICMP Message Types - 3

Destination Unreachable: No host/ network codes

Mail Exchange (MX)

E-mail servers

ICMP Message Types - 0

Echo Reply: Answer to type 8 Echo Request

ICMP Message Types - 8

Echo Request: Ping message requesting echo

FERPA

Education records

Web of trust

Entities sign certs for each other

Issuer

Entity that verifies authenticity of certificate

brute force

Every possible combination of letters, numbers, and characters

Ext:

File Extension

RST

Forces comms termination in both directions

PSH

Forces delivery without concern for buffering

Reconnaissance/footprinting

Gathering information on targets, whereas foot-printing is mapping out at a high level. These are interchangeable in CEH

FISMA

Gov Networks Security STD

App/Presentation/Session Layer protocols and services

HTTP, FTTP, Telnet, NTP, DHCP, PING

MD5

Hash Algo. 128bit hash, express as 32bit hex

SHA1:

Hash Algo. 160bit has, rq 4 use in US apps

SHA2:

Hash Algo. 4 sep hash 224, 256, 384, 512

Address (A)

IP to Hostname for DNS lookup

Pointer (PTR):

IP to Hostname; for DNS lookup

Network Layer protocols and services

IP, ARP, ICMP, IGMP

ISO 27002

InfoSec Guidelines

DMCA

Intellectual Property

SPY-Act

License Enforcement

Loc:

Maps Location

CIDR

Method of the representing IP addresses

Name Server (NS)

NameServers with namespace

Regional Registry Coverage Map

North America - ARIn South America - Lacnic Europe - Ripe Africa - AFRINIC Asia - APNIC

Attack types

OS: Attacks targeting default OS Settings App Level: Application code attacks Shrink Wrap: off the shelf scripts and code Misconfiguration: not configured well

Transport Layer protocols and services

TCP, UDP

ICMP Message Types - 11

Time exceeded: Packet too long to be routed

Kerberos

88

3DES

Symmetric Algo. Triple repeated process for added strength until orgs can afford AES. 168bit keys (56bitx3)

IDEA

Symmetric Algo. International Data Encryption Algorithm. Block Cipher. Operates similar to DES (operates on 64bit blocks using 128bit key). Used with PGP

Threefish

Symmetric Algo. Large tweakable symmetric key block cipher. Block and key sizes are equal (256, 512, 1024)

Port Numbers

0-1023: Well-Known 1024-49151: Registered 49152-65535 Dynamic

DES

Symmetric Algo. Data Encryption Standard - the archetypal block cipher. Designed to encipher and decipher blocks of data consisting of 64 bits under control of a 56bit key. (8bit parity); fixed block

IPv4 notation

/30=3 .225.252 /28=16 .255.240 /26=64 .255.192 /24=64 .255.0 /22=1024 .248.0 /20=4096 .240.0

TACACS

49

DNS port number

53

POP3

110

Portmapper (Linux)

111

NNTP

119

FTP

20/21

SSH

22

Telnet

23

SMTP

25

HTTP

80/8080

WINS

42

GLBA

Personal Finance Data

Start of Authority (SOA):

Primary name server

RFC 1918

Private IP Standard

RSA

Public Key crypto system for internet encryption and authentication. 2 very large Prime #s, 4,096bit. Modern std for asymmetric encryption.

5 phases to a penetration test/hacking phases

Recon Scanning & Enumeration Gaining Access Maintaining Access Covering Tracks

ICMP Message Types - 5

Redirect 2+ gateways for sender to use or the best route not the configured default gateway

Site:

Search only within domain

Key usage:

Shows for what purpose cert was made

ICMP Message Types - 4

Source Quench: Congestion control message

AES

Symmetric Algo. Advanced Encryption Standard is a symmetric key algorithm used by US gov to secure sensitive but unclassified material. Iterated block cipher, works by repeating the same operation multiple times. Replaced DES. It has a 128-bit block size with key sizes of 129, 192, and 256.

Subject

Whoever/whatever being identified by cert

XMKS

XML PKI System

allintitle:

any keywords can be in title

allinurl:

any of the keywords can be in url

chosen-plaintext

attacker defines their own plaintext

known plaintext attack

attacker has knowledge of some part of the plain text. search plaintext for repeatable sequences. Compare to t versions

DHCP

client - Discover -> Server Client<--Offers--Server Client--Request-->Server Client<--ACK--Server IP is removed from pool

RFC 3227

collecting and storing data


Conjuntos de estudio relacionados

Sociology - CH 1: An introduction to sociology

View Set

ADV ECONOMICS: Chapters 3 and 4 - Supply and Demand

View Set