Podcast
Questions and Answers
What is the primary purpose of the cyber kill chain methodology?
What is the primary purpose of the cyber kill chain methodology?
- To identify and prevent malicious intrusion activities (correct)
- To facilitate communication between hackers
- To create educational materials for hacking courses
- To develop new hacking tools and technologies
Which of the following activities is involved in the reconnaissance phase of the cyber kill chain?
Which of the following activities is involved in the reconnaissance phase of the cyber kill chain?
- Sending the weaponized bundle to the victim
- Gathering information about the target organization through social engineering (correct)
- Identifying open ports and services
- Creating a phishing email campaign
During the weaponization phase, what is typically created?
During the weaponization phase, what is typically created?
- A comprehensive report on cybersecurity measures
- A deliverable malicious payload (correct)
- A grant proposal for additional funding
- A security policy document
Which of the following best describes the delivery phase of the cyber kill chain?
Which of the following best describes the delivery phase of the cyber kill chain?
Which technique is NOT typically used during the reconnaissance phase?
Which technique is NOT typically used during the reconnaissance phase?
What is a common activity during the weaponization phase?
What is a common activity during the weaponization phase?
How does the cyber kill chain help security professionals?
How does the cyber kill chain help security professionals?
Which of the following actions would NOT be part of preparing a cyber attack?
Which of the following actions would NOT be part of preparing a cyber attack?
What is a characteristic feature of a computer virus?
What is a characteristic feature of a computer virus?
Which of the following is NOT a purpose of creating viruses?
Which of the following is NOT a purpose of creating viruses?
What is the first stage in the virus lifecycle?
What is the first stage in the virus lifecycle?
What indication might suggest that a virus has compromised a system?
What indication might suggest that a virus has compromised a system?
How do viruses typically spread to other systems?
How do viruses typically spread to other systems?
Which of the following actions activates a virus within a target system?
Which of the following actions activates a virus within a target system?
What would NOT typically be a symptom of a virus attack on a computer?
What would NOT typically be a symptom of a virus attack on a computer?
What is one potential motive for a hacker to create a virus?
What is one potential motive for a hacker to create a virus?
What is the recommended security setting level for your Internet browser to protect against spyware?
What is the recommended security setting level for your Internet browser to protect against spyware?
Which of the following is a valid reason to avoid opening emails from unknown senders?
Which of the following is a valid reason to avoid opening emails from unknown senders?
What is one effective way to enhance the security level of your computer?
What is one effective way to enhance the security level of your computer?
Why is it important to regularly update virus definition files?
Why is it important to regularly update virus definition files?
What should you do before downloading software from a website?
What should you do before downloading software from a website?
When using peer-to-peer file-swapping software, what precaution should be taken?
When using peer-to-peer file-swapping software, what precaution should be taken?
What action is advisable to take if you identify vulnerabilities in your operating system?
What action is advisable to take if you identify vulnerabilities in your operating system?
When is it safe to perform web surfing and download files?
When is it safe to perform web surfing and download files?
Which of the following is a common way a virus can be created?
Which of the following is a common way a virus can be created?
What is ransomware primarily designed to do?
What is ransomware primarily designed to do?
Which of the following is NOT a type of virus mentioned?
Which of the following is NOT a type of virus mentioned?
What distinguishes computer worms from viruses?
What distinguishes computer worms from viruses?
Which of the following is a responsibility of antivirus applications?
Which of the following is a responsibility of antivirus applications?
Which ransomware mentioned primarily attacks victims through email campaigns?
Which ransomware mentioned primarily attacks victims through email campaigns?
What type of virus is known to modify its own code to avoid detection?
What type of virus is known to modify its own code to avoid detection?
What is a common characteristic of malicious online ads?
What is a common characteristic of malicious online ads?
Which of the following best describes an encryption virus?
Which of the following best describes an encryption virus?
What is a potential consequence of connecting to untrusted networks?
What is a potential consequence of connecting to untrusted networks?
What is the primary purpose of ethical hacking in an organization?
What is the primary purpose of ethical hacking in an organization?
Which of the following skills are considered non-technical for an ethical hacker?
Which of the following skills are considered non-technical for an ethical hacker?
Which Google advanced search operator restricts results to documents that contain all the search keywords in the title?
Which Google advanced search operator restricts results to documents that contain all the search keywords in the title?
What limitation is associated with hiring an ethical hacker?
What limitation is associated with hiring an ethical hacker?
Which tool would be used for extracting information about live hosts and open ports on a network?
Which tool would be used for extracting information about live hosts and open ports on a network?
Which of the following is NOT a type of scanning tool?
Which of the following is NOT a type of scanning tool?
What is a primary function of reconnaissance in ethical hacking?
What is a primary function of reconnaissance in ethical hacking?
Which ethical hacking tool assists in extracting NetBIOS statistics?
Which ethical hacking tool assists in extracting NetBIOS statistics?
What does ethical hacking primarily aim to improve in an organization?
What does ethical hacking primarily aim to improve in an organization?
Which of the following represents a benefit of using Google hacking in reconnaissance?
Which of the following represents a benefit of using Google hacking in reconnaissance?
What is the primary focus of the 'Scanning' phase in ethical hacking?
What is the primary focus of the 'Scanning' phase in ethical hacking?
Which of the following operators can be used to restrict search results to a specific website's domain?
Which of the following operators can be used to restrict search results to a specific website's domain?
Which of the following is a characteristic of technical skills required for ethical hackers?
Which of the following is a characteristic of technical skills required for ethical hackers?
What should organizations do to make the most out of hiring an ethical hacker?
What should organizations do to make the most out of hiring an ethical hacker?
Flashcards
Cyber Kill Chain
Cyber Kill Chain
A methodology used to identify and prevent malicious intrusion activities. Helps security professionals understand how attackers may target systems.
Reconnaissance
Reconnaissance
The initial stage of the Cyber Kill Chain where attackers gather information about the target to find vulnerabilities. This can involve researching the organization, its employees, and its online presence.
Weaponization
Weaponization
The process of creating a malicious payload, combining an exploit and a backdoor to create a weaponized tool.
Delivery
Delivery
Signup and view all the flashcards
Ethical Hacking
Ethical Hacking
Signup and view all the flashcards
Google Hacking
Google Hacking
Signup and view all the flashcards
Whois Lookup
Whois Lookup
Signup and view all the flashcards
Nmap
Nmap
Signup and view all the flashcards
Computer Worm
Computer Worm
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Creating a Virus
Creating a Virus
Signup and view all the flashcards
Design (Virus Lifecycle)
Design (Virus Lifecycle)
Signup and view all the flashcards
Replication (Virus Lifecycle)
Replication (Virus Lifecycle)
Signup and view all the flashcards
Launch (Virus Lifecycle)
Launch (Virus Lifecycle)
Signup and view all the flashcards
Detection (Virus Lifecycle)
Detection (Virus Lifecycle)
Signup and view all the flashcards
Incorporation (Virus Lifecycle)
Incorporation (Virus Lifecycle)
Signup and view all the flashcards
Execution of Damage Routine (Virus Lifecycle)
Execution of Damage Routine (Virus Lifecycle)
Signup and view all the flashcards
Boot Sector Virus
Boot Sector Virus
Signup and view all the flashcards
File Virus
File Virus
Signup and view all the flashcards
Macro Virus
Macro Virus
Signup and view all the flashcards
Stealth Virus
Stealth Virus
Signup and view all the flashcards
Encryption Virus
Encryption Virus
Signup and view all the flashcards
FAT Virus
FAT Virus
Signup and view all the flashcards
Web Scripting Virus
Web Scripting Virus
Signup and view all the flashcards
Email Virus
Email Virus
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Backdoor
Backdoor
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
Exploit Kit
Exploit Kit
Signup and view all the flashcards
Study Notes
Cyber Kill Chain Methodology
- The Cyber Kill Chain methodology is used to identify and prevent malicious intrusion activities.
- It helps security professionals to understand the adversary's tactics, techniques, and procedures beforehand.
Reconnaissance
- It gathers data on the target to probe for weak points.
- Activities include:
- Gathering information about the target organization through the internet or social engineering.
- Performing analysis of online activities and publicly available information.
- Gathering information from social networking sites and web services.
- Obtaining information about websites visited.
- Monitoring and analyzing the target organization’s website.
- Performing Whois, DNS, and network footprinting.
- Performing scanning to identify open ports and services.
Weaponization
- Creates a deliverable malicious payload using an exploit and a backdoor.
- Activities include:
- Identifying appropriate malware payload based on the analysis.
- Creating a new malware payload or selecting, reusing, and modifying available malware payloads based on the identified vulnerability.
- Creating a phishing email campaign.
- Leveraging exploit kits and botnets.
Delivery
- Sends weaponized bundle to the victim using email, USB, etc.
- The Gaining Access and Maintaining Access, as well as the Reconnaissance and Covering Tracks phases of the kill chain may be noticeable by the target organization.
Ethical Hacking Scope
- It is a crucial component of risk assessment, auditing, counter fraud, and information systems security best practices.
- It is used to identify risks and highlight remedial actions.
- It reduces Information and Communication Technology (ICT) costs by resolving vulnerabilities.
Ethical Hacking Limitations
- Without knowing what is being searched for and why, hiring an outside vendor to hack systems will not prove beneficial.
- An ethical hacker can only help an organization to better understand its security system; it is up to the organization to place the right safeguards on the network.
Skills of an Ethical Hacker
- Technical skills require in-depth knowledge of major operating environments, such as Windows, Unix, Linux, and Macintosh.Â
- Technical skills require in-depth knowledge of networking concepts, technologies, and related hardware and software.
- Â Technical skills require an expert understanding of technical domains.
- Â Technical skills require knowledge of security areas and related issues.
- Â Technical skills require high technical knowledge of how to launch sophisticated attacks.
Non-Technical Skills of an Ethical Hacker
- The ability to quickly learn and adapt new technologies.
- A strong work ethic and good problem-solving and communication skills.
- Commitment to an organization’s security policies.
- An awareness of local standards and laws.
Reconnaissance Using Advanced Google Hacking Techniques
- Google hacking refers to the use of advanced Google search operators for creating complex search queries to extract sensitive or hidden information that helps attackers find vulnerable targets.
Popular Google Advanced Search Operators
- [cache:] Displays the web pages stored in the Google cache.
- [link:] Lists web pages that have links to the specified web page.
- [related:] Lists web pages that are similar to the specified web page.
- [info:] Presents some information that Google has about a particular web page.
- [site:] Restricts the results to those websites in the given domain.
- [allintitle:] Restricts the results to those websites containing all the search keywords in the title.
- [intitle:] Restricts the results to documents containing the search keyword in the title.
- [allinurl:] Restricts the results to those containing all the search keywords in the URL.
- [inurl:] Restricts the results to documents containing the search keyword in the URL.
- [location:] Finds information for a specific location.
Reconnaissance Tools
- Web Data Extractor: Extracts targeted contact data (email, phone, and fax) from the website, extracts the URL and meta tags (title, description, keyword) for website promotion.
- Whois Lookup: Provides information about a domain name.
Scanning ToolsÂ
- Nmap: Extracts information such as live hosts on the network, open ports, services (application name and version), types of packet filters/ firewalls, as well as operating systems and versions used.
- MegaPing: Comprehensive Security Scanner, Port scanner (TCP and UDP ports), IP scanner, NetBIOS scanner, and Share Scanner.
- Unicornscan: Identifies the OS of the target machine by observing the TTL values in the scan result.
- Hping2/Hping3: Uses ICMP echo requests to determine if a host is online.
- NetScanTools Pro: Scans networks for open ports, vulnerable services, and other security risks.
- SolarWinds Port Scanner: Scans networks for open ports and vulnerable services.
- PRTG Network Monitor: Monitors network devices and applications to detect problems, and provides real-time network performance data.
- OmniPeek Network Protocol Analyzer: Captures and analyzes network traffic to identify security threats, troubleshoot network problems, and optimize network performance.
Enumeration ToolsÂ
- Nbtstat Utility: Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local and remote computers, and the NetBIOS name cache.
- NetBIOS Enumerator: Enumerates details, such as NetBIOS names, Usernames, Domain names, and MAC addresses, for a given range of IP addresses.
- Other NetBIOS Enumeration Tools
- Global Network Inventory
- Advanced IP Scanner
- Hyena
- Nsauditor Network Security Auditor
Threat and Threat SourcesÂ
- A threat is any potential danger that could exploit a vulnerability and harm an information system or organization.Â
- A threat source is the origin of a threat.
What is a Virus?Â
- A virus is a self-replicating program that produces its own copy by attaching itself to another program, computer boot sector, or document.
- Viruses are transmitted through:
- File downloads.
- Infected disk/flash drives.
- Email attachments.
Characteristics of VirusesÂ
- Infect other programs.
- Transform themselves.
- Encrypt themselves.
- Alter data.
- Corrupt files and programs.
- Self-replicate.
Purpose of Creating VirusesÂ
- Inflict damage on competitors.
- Realize financial benefits.
- Vandalize intellectual property.
- Play pranks.
- Conduct Research.
- Engage in cyber-terrorism.
- Distribute political messages.
- Damage networks or computers.
- Gain remote access to a victim's computer.
Indications of Virus Attack
- Processes require more resources and time, resulting in degraded performance.
- Computer beeps with no display.
- Drive label changes and OS does not load.
- Constant antivirus alerts.
- Computer freezes frequently or encounters an error such as BSOD.
- Files and folders are missing.
- Suspicious hard drive activity.
- Browser window "freezes".
Stages of Virus Lifecycle
- Design: Development of virus code using programming languages or construction kits.
- Replication: The virus replicates for a period within the target system and then spreads itself.
- Launch: The virus is activated when the user performs specific actions such as running an infected program.
- Detection: The virus is identified as a threat infecting the target system.
- Incorporation: Antivirus software developers assimilate defenses against the virus.
- Execution of the damage routine: Users install antivirus updates and eliminate the virus threats.
How does a Computer Get Infected by Viruses?
- Accepting files and downloads without checking the source.
- Opening infected emails and file attachments.
- Installing pirated software.
- Not updating and not installing new versions of plug-ins.
- Not running the latest antivirus application.
- Clicking malicious online ads.
- Using portable media.
- Connecting to untrusted networks.
Types of VirusesÂ
- System or Boot Sector Virus.
- File and Multipartite Virus.
- Macro and Cluster Virus.
- Stealth/Tunneling Virus.
- Encryption Virus.
- Sparse Infector Virus.
- Polymorphic Virus.
- Metamorphic Virus.
- Overwriting File or Cavity Virus.
- Companion/Camouflage Virus.
- Shell and File Extension Virus.
- FAT and Logic Bomb Virus.
- Web Scripting Virus.
- Email and Armored Virus.
- Add-on and Intrusive Virus.
- Direct Action or Transient Virus.
- Terminate & Stay Resident Virus.
Creating a Virus
- Writing a Virus Program: Programmers may create custom viruses with unique traits.
- Virus Maker Tools:
- DELmE's Batch Virus Maker.
- Bhavesh Virus Maker SKW.
- Deadly Virus Maker.
- SonicBat Batch Virus Maker.
- TeraBIT Virus Maker. Â
- Andreinick05's Batch Virus Maker.
Ransomware
- A type of malware that restricts access to the computer system's files and folders.Â
- Demands an online ransom payment to the malware creator(s) to remove the restrictions.
Popular Ransomware Families
- Dharma: Attacks victims through email campaigns; victims are asked to contact attackers via a provided email address and pay in bitcoins for the decryption service.
- eCh0raix
- SamSam
- WannaCry
- Petya and NotPetya
- GandCrab
- MegaCortex
- LockerGoga
- NamPoHyu
- Ryuk
- Cryptgh0st
Ransomware Families
- Cerber
- CTB-Locker
- Sodinokibi
- BitPaymer
- CryptXXX
- Cryptorbit ransomware
- Crypto Locker Ransomware
- Crypto Defense Ransomware
- Crypto Wall RansomwareÂ
Computer Worms
- Malicious programs that independently replicate, execute, and spread across the network connections.
- Consume available computing resources without human interaction.
- Attackers use worm payloads to install backdoors in infected computers.
- Examples:
- Monero: A cryptocurrency miner that uses the victim's computer to mine cryptocurrency for the attacker.
- Bondat: A worm that uses a vulnerability in Microsoft Windows to spread and steal sensitive data.
- Beapy: A worm used to steal passwords, credit card information, and other sensitive data.
How is a Worm Different from a Virus?
- Viruses: Need a host program to replicate and spread.
- Worms: Replicate autonomously and spread through network connections.
- Viruses: Do not typically spread across networks.
- Worms: Can spread rapidly across networks.
- Viruses: Usually requires user action to activate.
- Worms: Can exploit system vulnerabilities and spread without requiring user action.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.