Cerified Ethical Hacker

¡Supera tus tareas y exámenes ahora con Quizwiz!

You just purchased a new computer, pre-installed with Windows 7, McAfee antivirus and other applications. Before connecting the Ethernet wire to the modem, what should you do?

-Install the latest antivirus signatures. -Configure Windows Update to 'automatic'. -Create a non-admin user account with a complex password, and logon to this account.

Where is the password file kept in Linux?

/etc/shadow

Tool for ARP response MAC flooding.

/macof

LAN Manager passwords are concantenated to 14 bytes, split in half, and each half (7 bytes) is hashed separately. If a password is 7 characters or less, what will the second hash be?

0xAAD3B435B51404EE

How many steps for an ARP poisoning attack?

1. Send a Malicious ARP "reply" to the router, to associate the "attacker" MAC address to the IP address. 2.Send a Malicious ARP "reply" to the Victim computer, to then identify the Attack computer, as the router.

How do you protect against, SYN flood attacks?

1. Stack Tweaking. 2. Send the wrong SYN/ACK, to the client. 3. Micro Blocks.

3 steps involved in Network Level Hijacking.

1. Trap... 2. De-synch. 3. Take Over.

How long to crack a 22 character ditionary password?

5 minutes

Exploit

A defined way to breach the security of an IT system through a vulnerability, using malicious software or commands.

Daisy Chaining

A method of external testing whereby several systems or resources are used together to affect an attack. Using another system or device to perform illegal activities.

What can be done to sniff a switched network?

ARP spoof the default gateway.

Prudent Security Policy

All services blocked. Administrator enables safe and necessary services, individually. All activities logged.

What is found in NTFS, and is described as the ability to fork file data into existing files, without affecting their functionality, size, or display, to traditional file browsing utilities like DIR or Windows Explorer.

Alternate Data Streams

Trojan Horse

An "Unauthorized" program contained inside a legitimate program and runs unknown to the user.

Zero-Day Attack

Attack between the time a new software vulnerability is discovered and the software developers release software that fixes the vulnerability

IPv6 Security Threats

Auto Configuration. Unavailability. Repudiation-Based protection. Incompatibility of Logging Systems. Rate Limiting (Impractical). Default IPv6 Activation. Complexity of Network Management tasks. Complexity of Vulnerability Assessment. Overlaoding Perimeter Security Controls. Translating IPv4 to IPv6. Security Information and Event Management (SIEM) problems.

How is data sent when basic authentication is configured on a webserver?

Clear Text (unencrypted)

Network Threat

Collection of computers and other hardware, connected by communication channels to share resources and information.

What would you use to send/receive unauthorized information without alerting the IDS?

Covert Channel

What layer do sniffers operate at?

Data Link Layer

Incident Management

Defined processes to Identify, Analyze, Prioritize, and Resolve security incidents To restore the system to normal operations as soon as possible.

Hybrid Password attack

Dictionary attack combined with exchanging letters with numbers, and special characters.

Vulnerability Research

Discovering system design faults and weaknesses, that might help attackers compromise the system. Keep abreast of current exploits, trends or threats. Checking newly released alerts. How to recover from attacks.

Key feature of a Worm.

Does not require the infection of executables, to run. They can spread on their own.

Penetration Testing

Evaluation of the security of a system or network, by simulating an attack to find design weaknesses, technical flaws and vulnerabilities , that could be exploited.

S.I.E.M. -Security Information and Event Management.

Every IPv6 host can have multiple IPv6 addresses simultaniously, leading to complexity of log or event correlation.

Paranoid Security Policy

Everything is forbidden. Strict restrictions on usage. No or limited internet usage.

Vulnerability

Existance of a loop-hole, limitation or weakness, design or implementation error, that can lead to an unexpected and undesirable event, compromising the security of the system.

Hacking

Exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources. Modifying system or application features to achieve a goal outside the creators original purpose.

Slammer Worm

Exploits stack-based overflow in DLL, implementing the Resolution Service. Targets MS-SQL

What tool would allow you, to detect unauthorized modifications of binary files, on your system by unknown malware?

File integrity verification tools

Tool for sniffing NFS files over a company network.

Filesnarf

Hacking tool, which can be used to port-scan a system, using a floppy disk. It Boots-up mini-Linux, and Displays the Blue Screen of Death screen. It then Port-scans the network using NMAP, and then Sends the results by e-mail to a remote server.

Floppy Scan

What is defined as the process of collecting as much information as possible about a target network?

Footprinting

Best reason to send a single SMTP message to an address that does not exist?

Gather information about internal hosts used in email treatment.

Where would you look for a Trojan startup settings?

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows\CurrentVersion\Run

Protocols vulnerable to Sniffing.

HTTP, Telnet, R.Login, Pop3, IMAP, SMTP, NNTP, FTP

Human Threats

Hackers, Insiders, Social Engineering, Lack of knowledge, and or awareness.

How does tripwire work?

Hashes files and compares old hashes, to current hashes. It catches unexpected changes to a system utility file that might indicate it has been replace by a Trojan file.

What would be the fastest attack against complex passwords?

Hybrid attack

Default IPv6 Activation threat.

IPv6 activated without administrators knowledge, leaving IPv4 based security controls ineffective.

Confidentiality, Integrity, Availability, Authenticity, and Non-Repudiation, are all elements of___.

Information Security

Best prevention against viruses.

Install and update antivirus scanner.

Hack Value

It is the notion among hackers that something is worth doing or is interesting

How does tracert map the route a packet travels from A to B?

It manipulates (TTL) time to live, within a packet, to elicit a time (jump) exceeded in transit to message.

What internet registry can be used to find the geographical location of an IP address from Panama.

LACNIC

GSM

LTE. Universal system used for mobile wireless network.

Incident Management Process

Logging, recording, and resolving incidents. Preparation. Detection and Analysis. Classification and Prioritization. Notification. Containment. Forensic Investigation. Eradication and Recovery. Post Incident Activities.

What is a CAM table?

MAC address Table

What are the most prominent SQL products today?

MS-SQL, Oracle, MySQL.

Permissive Security Policy

Majority of internet traffic is accepted, while Known Dangerous services and attacks are blocked.

Remote Access Trojan - Rat

Malware that installs a backdoor and allows an attacker remote access to a system.

Non-Repudiation

Method of ensuring a party cannot deny the authenticity of their signature, to a message they originated.

What are the 3 classes of Information Security Threats?

Natural, Physical, Human.

Promiscuous Security Policy

No restrictions on internet access

What can be done to protect a packet from session hijacking?

Packet Signing

NS lookup is a good tool, used to gain additional information about a target network. What does the following command accomplish? C:\Documents and Settings\Hacker>nslookup

Performs a Zone-Transfer

Hacker

Person who illegally, breaks into a system or network, to steal or destroy data, or perform malicious attacks.

What is the most common vehicle for social engineering attacks?

Phone (can be hidden behind)

What DoS method, sends fragmented ICMP packets, to a remote target?

Ping of Death

What are the three phases involved in security testing?

Preparation. Conduct. Conclusion.

What step should be taken, after cracking the password of a user account, and gaining access to the system?

Privilege Escalation

What tool uses LM hashes already computed, to crack a password?

RainbowCrack

Hacking Phases

Reconnaissance, Scanning (Pre-Attack Phase), Gaining Access, Maintaining Access, Clearing tracks.

In what hacking attack, is challenge and response authentication, used to prevent?

Replay Attacks

Steps to create and implement, Security Policies.

Risk Assessment. Standard Guidelines. Include senior management and staff. Set clear penalties and enforce them. Final version available to all staff. Everyone reads, signs and understands the policies. Install tools needed to enforce policy. Train employees.

Suspecting a Trojan, that your antivirus has missed, you run Netstat -an, and find port 6666 open. What is the next step?

Run fport utility, and look for the applications listening to the port

How are SSL and S-HTTP different?

SSL operates at the transport Layer, and is application independent. S-HTTP operates at the application layer, and Encrypts each message independently.

How would you search for newsgroup posting using Google search?

Search the target company name at http://groups.google.com

How does polymorphic shell code work?

Self-garbles code, to evade detection. Can mutate, and change, its known viral signature. It Encrypts the shell code, by XORing values over the shell code, uses a Loader Code to Decrypt the shell code, and then executes it.

Syn Flood Attack

Sending TCP connection requests, from a spoofed IP address, faster than a machine can process them.

Application Level hijacking involves determining the ___.

Session ID

Vulnerability Research classifications:

Severity level - Low, medium, high. Exploit Range - Local or remote.

What is the main drawback to antivirus software?

Signature driven, so new exploits are not detected.

What DoS attack, sends forged packets, and a broadcast address?

Smurf Attack

How can you detect sniffing interfaces?

Sniffing interface cannot be detected. You can send ARP requests to every PC and watch for the one, that responds to all requests. This one, is in promiscuous mode.

What software application can be used to hide data on CDs and flashdrives?

Snow

Which steganography utility exploits the nature of whitespace and allows the user to conceal information in these white spaces?

Snow

NTP - Network Time protocol.

Synchronizes clocks on a network. Can be used to hide log entries. Secure communications, requires clocks to be within 5 minutes.

While footprinting, what port/service should you look for to attempt a zone transfer?

TCP 53, DNS services, for zone transfers. UDP53 for queries.

Melissa Virus

Targets Microsoft Windows Platforms. Macro virus Category.

Social Engineering

The act of getting information, from a person, rather than breaking into a system.

Authenticity

The characteristic, that ensures the quality of being genuine, or not corrupted, from the original. Ensuring the message is not altered or forged. Confirming the user identity.

While gathering competitive intelligence on an organization. They have jobs listed on 5 job hunting sites. If there are two jobs for systems and network administrators, how can this help you in footprinting?

The types of operating systems and applications being used

Host threat

Threats directed at a particular system on which information resides.

Best reason for sending a single SMTP message to an address that does not exist within a target company?

To gather information about internal hosts used in email treatment. "No such recipient" error, can provide information about the name of the email server, versions used and so on.

What is a Wrapper? (Trojan context)

Tool used to bind a Trojan to a legitimate file.

What can be done to countermeasure SNMP attacks?

Use Encryption. Change Community Strings. (Read = Public, Read/Write = Private)

Covert Channel

Use of a protocol in a way that was not intended.

Information Warfare - InfoWar

Use of information and communication technologies to take competitive advantages over an opponent.

What can be used to create and secure sessions, from hijacking?

Use unpredictable sequence numbers.

What does a Sheepdip computer do?

Used only for virus checking.

Security Policy Classifications

User Policy, IT Policy, General Policies, Partner Policy, Issue-Specific Policies

Ethical Hacking

Using hacking tools, tricks, and techniques, to identify vulnerabilities, and ensure system security. Used to verify the existance of exploitable vulnerabilities. Requires target permission.

You are footprinting a website to gather competitive intelligence. You look for contact information and telephone numbers, but they are no longer available. How would you retrieve the information, if it used to be available previously? ( From an outdated website)

Visit Archive.org, and retrieve the archive of the website.

How do you calculate the range of sequence numbers that would be accepted by a server?

[Last received packet number +1) + Server-Receive-Window-Number

Hackers usually control bots through ___.

an IRC channel

Ethereal command, to view a three-way-handshake, for a connection to 192.168.0.1?

ip.addr==192.168.0.1 and tcp.flags.syn

Level of security in a system can be defined by the strength and balance of what 3 components?

the S.F.U. triangle.- Security, Functionality, Usability

Process for mirroring and downloading files, especially webpages.

wget -R, to mirror a site (i.e. wget -R www.testking.com)


Conjuntos de estudio relacionados

Pearson VUE: Property Insurance Practice Exam, Study questions insurance, Casualty FL

View Set

Unit 2 - Individual Securities Debt

View Set

The Early Civilization Picture Dictionary

View Set

AP Biology - Chapter 17 - Practice Test

View Set