ITN Module 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

competitive intelligence

A means of gathering information about a business or an industry by using observation, accessing public information, speaking with employees, and so on

piggybacking

A method attackers use to gain access to restricted areas in a company. The attacker follows an employee closely and enters the area with that employee

zone transfer

A method of transferring records from a DNS server to use in analysis of a network is uses the dig command

web bug

A small graphics file referenced in an <IMG> tag, used to collect information about the user. This file is created by a third-party company specializing in data collection

phishing

A social engineering attack carried out by email--for example, a message containing a link to fake Web sites intended to entice victims into disclosing private information or installing malware

shoulder surfing

A technique attackers use; involves looking over an unaware user's shoulders to observe the keys the user types when entering a password.

cookie

A text file containing a message sent from a Web server to a user's Web browser to be used later when the user revisits the Web site

spear phishing

A type of phishing attack that targets specific people in an organization, using information gathered from previous reconnaissance and footprinting; the goal is to trick recipients into clicking a link or opening an attachment that installs malware

Footprinting

Gathering information about a company before performing a security test or launching an attack; sometimes referred to as "reconnaissance."

dumpster diving

Gathering information by examining the trash that people discard

POST

HTTP command that allows data to be posted (i.e., sent to a Web server)

HEAD

HTTP command that is the same as the GET method, but retrieves only the header information of an HTML document, not the document body

OPTIONS

HTTP command that requests information on available options

PUT

HTTP command that requests that the entity be stored under the Request-URI

DELETE

HTTP command that requests that the origin server delete the identified resource

GET

HTTP command that retrieves data by URI

TRACE

HTTP command that starts a remote Application-layer loopback of the request message

CONNECT

HTTP command used with a proxy that can dynamically switch to a tunnel connection, such as Secure Sockets Layer (SSL)

Spidering or Crawling

Programmatically following every link on a Web page

social engineering

Using an understanding of human nature to get information from people

Plug-n-hack

What ZAP feature automatically edits the configuration of a Web browser to direct traffic through ZAP proxy. This allows the ZAP tool to intercept and manipulate traffic sent between your Web browser and the target Web server.

Google, Zed Attack Proxy, Whois, Domain Dossier , and dig and netcat command

What are some examples of reconnaisance tools?

High, Medium, Low, or informational

What are the four levels of vulnerability risks?

Start of Authority (SOA) record

What do you look for when determining a company's primary DNS server

information on company's IP addresses and other domains the company might be a part of

What does WHOIS display

persuasion, intimidation, coercion, extortion, and blackmail

What generalized methods are used by social engineers

email addresses

What information is extremely useful for digging for more information. In companies, these often show patterns for determining more

reconnaissance

What is another word for footprinting?

Company websites

Where do attackers often begin their information gathering?

Alerts tab in an HTML report

Where will possible vulnerabilities be located after an Active scan on ZAP and in what form

Active footprinting

footprinting where you are prodding the target network in ways that might seem suspicious to network defenders. This includes things like port scans, DNS zone transfers, and interacting with a target's Web server

at least 7

how many times should the software "disk cleaning" be used before being discarded

Passive footprinting

nonintrusive footprinting where you aren't accessing information illegally or gathering unauthorized information with false credentials. With this, you are not even engaging with the remote systems, but rather attempting to glean information about your target from other sources. These activities are likely to go unnoticed

Quid pro quo, urgency, status quo, kindness, and position

what are 5 techniques social engineers use to gain more information

Active Scan

what feature of ZAP sends the Web server a series of requests designed to identify vulnerabilities


Conjuntos de estudio relacionados

Living with art 11th edition chapter 21

View Set

NREMT Study Guide and will be deleted after finished

View Set

Nutrition and Diet Therapy BOIL-1322 Exam 4

View Set

GEOG 1000- Quiz 8: Cultural Geography; Population and Migration

View Set

Dudek Chapter 19: Nutrition for Patients with Diabetes Mellitus

View Set

Chapter 6: Reporting and Analyzing Cash, Fraud, and Internal Control

View Set

Unit 27: Real Estate Commission & License Law

View Set