Ethical Hacking (lect 1-1)
32 Questions
0 Views

Ethical Hacking (lect 1-1)

Created by
@LegendaryDecagon

Questions and Answers

Ethical Hackers (White hat hackers)

good hackers, defenders. Works for the benefit of the public.

Grey hat hacker

between the lines of good and bad hacker. Possibly rehabilitated.

Black hat hackers and cyberterrorists

Black hat hacker: criminals Cyberterrorists: hackers that are terrorists. Destroy targets and cause physical harm (to the person using the target device). Sometimes their actions are not stealthy. Cyberterrorists aim to cause actual physical injury or danger, going beyond just digital damage.

Botnet

<p>a network of computers that are compromised. the botnet herder or botmaster can control and command them using command and control software.</p> Signup and view all the answers

Storm botnet

<p>infects machines mostly by malware in email attachments and have them use the eDonkey peer-to-peer network to find other infected machines. It was used not just for spam but for Distributed Denial-of-Service and for harvesting credentials.</p> Signup and view all the answers

Conficker botnet

<p>a worm that spreads by exploiting Windows network service vulnerability. generated domain names every day and infected machines are put in those domains which the botmaster had control.</p> Signup and view all the answers

Mirai botnet

<p>A family of botnets that exploit IoT devices. The first Mirai worm infected CCTV cameras that had been manufactured by Xiaomi and that had a known factory default password that could not be changed.</p> Signup and view all the answers

How to put machines into a domain

<p>To put machines into a domain, particularly in the context of botnets and cybersecurity, the botmaster typically uses a method called &quot;domain generation algorithm&quot; (DGA). Here’s how it works:</p> <ol> <li> <strong>Generate Domains</strong>: The botmaster's malware generates a list of domain names daily.</li> <li> <strong>Register Domains</strong>: The botmaster registers some of these domains.</li> <li> <strong>Malware Connects</strong>: Infected machines (bots) use the same DGA to generate the same list of domains and attempt to connect to them.</li> <li> <strong>Command and Control</strong>: Once a bot connects to a registered domain, it can receive commands and updates from the botmaster. This technique helps the botmaster maintain control over the botnet even if some domains get blocked or taken down.</li> </ol> Signup and view all the answers

tools and activities used to develop malware

<p>perform research on turning vulnerabilities into exploits. develop remote access trojans that delivers malware. build robust domain generation algorithm software for command and control communications. design specialized payloads for various purposes.</p> Signup and view all the answers

A Trojan, or Trojan horse

<p>type of malware that disguises itself as legitimate software or is hidden within legitimate software. Once installed, it can perform malicious activities</p> Signup and view all the answers

Android malware

<p>&quot;Unpatched old Android devices&quot; refers to older Android smartphones or tablets that haven't received recent software updates or security patches. In many countries, they are sources of malware infection.</p> Signup and view all the answers

Dropper

<p>A replication mechanism that malware has. Examples: Worm: Malware that copies itself when it is run (Standalone!) Virus: Malware spread through other software as medium, such as macros in documents.</p> Signup and view all the answers

Payload

<p>An actual code that causes damages. Exfiltrate the victim’s data, Encrypt the victim’s data, Steal important credentials (passwords, etc.), Surveil the victim’s machine, Steal CPU power (to, e.g., mine cryptocurrency), Install some other malware.</p> Signup and view all the answers

Ransomware

<p>threatens to publish victim's personal data or block access to it unless a ransom is paid. it encrypts the victim's files, making them inaccessible and demands a ransom payment to decrypt them. Bitcoin and other cryptocurrencies are used as payment methods, making tracing difficult.</p> Signup and view all the answers

Scareware

<p>a technique used by cybercriminals. It involves tricking users into thinking their computer is infected with a virus or has some other serious problem, often through fake pop-up alerts or bogus software. The goal is to scare the user into paying for unnecessary or harmful software to &quot;fix&quot; the problem.</p> Signup and view all the answers

Ransomware-as-a-Service (RaaS)

<p>These platforms allow anyone, even amateurs, to launch ransomware attacks. The operators using these services might not have the technical ability to decrypt files, meaning even if the victim pays the ransom, their files may remain inaccessible.</p> Signup and view all the answers

Hactivism

<p>It often involves cyberattacks or digital disruptions against government, corporate, or institutional targets to protest, raise awareness, or enact change in line with the hackers' beliefs or goals. the attacks are usually denial-of-service: Companies or individuals cannot operate normally if they receive a lot of angry emails or tweets and doxing: search for and publish private or identifying information about a particular individual on the internet without their consent, typically with malicious intent.</p> Signup and view all the answers

Online shaming

<p>&quot;Online shaming&quot; refers to the act of publicly criticizing, ridiculing, or shaming an individual or group through online platforms. eg. dog poo girl.</p> Signup and view all the answers

Mass surveillance

<p>Mass surveillance isn't just the government spying on people, though that's a big part of it. It also involves data collection by big companies like social media platforms and tech giants. They gather lots of info for things like targeted ads, but there's always a concern about privacy and how this data might be used or misused.</p> Signup and view all the answers

mass surveillance(tempora)

<p>to collect data from international fibre optic cables. International fibre optic cables are physical cables that are laid on the ocean floor, connecting continents and countries across vast distances.</p> Signup and view all the answers

mass surveillance(Muscular)

<p>it collects data as it flowed between the data centres of large service firms such as Yahoo and Google.</p> Signup and view all the answers

mass surveillance(XKeyscore)

<p>a search engine used by the NSA and other members of the &quot;Five Eyes&quot; alliance (the US, UK, Canada, Australia, and New Zealand) to search through massive amounts of data. Here’s a breakdown of how it works: Data Collection: It gathers data like emails, SMS messages, chats, address book entries, and browsing histories from various sources. Remote Search: Analysts can search this collected data remotely through a distributed database. Tasked Items: Specific data requested by analysts is extracted and sent to them. Notification System (Trafficthief): Alerts analysts when their targets do something noteworthy. Target Discovery: It can also find new targets. For example, analysts can use queries like “Show me all the exploitable machines in country X” to identify vulnerable machines. A tool called Mugshot helps compile machine fingerprints for this purpose.</p> Signup and view all the answers

Identity theft

<p>Stealing of the information that allow a person to impersonate other person(s) for illegal purposes, mainly financial gains such as opening credit card/bank account, obtaining rental properties and etc.</p> Signup and view all the answers

Theft of service

<p>Use of phone, Internet, streaming movies or similar items without permission; it usually involves password cracking. Example: Sharing a Netflix account with even friends can be considered as theft and can be prosecuted in certain states of US.</p> Signup and view all the answers

Network intrusion or unauthorized access

<p>Most common type of attack; it leads to other cybercrimes. Example: Breaking into your neighbour’s WiFi network will open a lot of opportunities of attack.</p> Signup and view all the answers

Posting and/or transmitting illegal material

<p>Distribution of pirated software/movies, child pornography.</p> Signup and view all the answers

Fraud

<p>Deceiving another party or parties to illicit information or access typically for financial gain or to cause damage</p> Signup and view all the answers

Embezzlement

<p>A form of financial fraud involving theft and/or redirection of funds.</p> Signup and view all the answers

Dumpster Diving

<p>Gathering information from discarded/unattended material (ATM receipt, credit card statement and etc.),Going through rubbish itself is not illegal but going through rubbish in private property is.</p> Signup and view all the answers

DoS (Denial of Service) /DDoS (Distributed Denial of Service)

<p>Overloading a system’s resources so that it cannot provide the required services to legitimate users. DDoS is performed in a larger scale – It is not possible to prevent DoS by blocking one source.</p> Signup and view all the answers

Cyberstalking/Cyberbullying

<p>A relatively new crime on the list. The attacker uses online resources and other means to gather information about an individual and uses this to track, in some cases, to meet the person (cyberstalking); to harass the person (cyberbullying)</p> Signup and view all the answers

Cyberterrorism

<p>Attackers make use of the internet to cause significant bodily harm to achieve political gains. The scope of cyberterrorism is controversial. Related to information warfare.</p> Signup and view all the answers

More Quizzes Like This

Ethical Hacking Fundamentals
9 questions

Ethical Hacking Fundamentals

MemorablePointillism avatar
MemorablePointillism
Ethical Hacking (lect 1-2)
8 questions
Ethical Hacking Methodologies and Laws
25 questions
Use Quizgecko on...
Browser
Browser