Podcast
Questions and Answers
What is the main objective of ethical hacking? (Select all that apply)
What is the main objective of ethical hacking? (Select all that apply)
- To steal confidential data
- To cause harm to the target system
- To protect the system by identifying vulnerabilities (correct)
- To destroy the target’s infrastructure
Which of the following is NOT a type of hacker?
Which of the following is NOT a type of hacker?
- Black Hat
- White Hat
- Blue Hat (correct)
- Red Hat
During which phase of ethical hacking does scanning occur?
During which phase of ethical hacking does scanning occur?
- Gaining Access
- Scanning
- Reconnaissance (correct)
- Maintaining Access
What is a Zero-Day attack?
What is a Zero-Day attack?
What does a 'payload' refer to in hacking terminology?
What does a 'payload' refer to in hacking terminology?
Which port is commonly used for HTTPS?
Which port is commonly used for HTTPS?
What type of social engineering attack involves an attacker following someone into a restricted area?
What type of social engineering attack involves an attacker following someone into a restricted area?
Which scan method is used to identify live hosts by sending ICMP packets?
Which scan method is used to identify live hosts by sending ICMP packets?
What is the main goal of a 'Dumpster Diving' attack?
What is the main goal of a 'Dumpster Diving' attack?
In password cracking, which attack involves trying every possible combination of characters?
In password cracking, which attack involves trying every possible combination of characters?
Which tool is commonly used for port scanning?
Which tool is commonly used for port scanning?
Which payload in Metasploit helps in creating a remote connection with the target system?
Which payload in Metasploit helps in creating a remote connection with the target system?
Which of the following is NOT a component of Metasploit?
Which of the following is NOT a component of Metasploit?
What does VPN stand for?
What does VPN stand for?
Which scanning method is designed to bypass firewalls by sending specific TCP flags?
Which scanning method is designed to bypass firewalls by sending specific TCP flags?
What is the primary goal of a 'Rootkit'?
What is the primary goal of a 'Rootkit'?
Which of the following is a method of privilege escalation?
Which of the following is a method of privilege escalation?
What is the purpose of IP Spoofing?
What is the purpose of IP Spoofing?
Which of the following methods is used to detect open ports on a network?
Which of the following methods is used to detect open ports on a network?
What does 'Spear Phishing' target?
What does 'Spear Phishing' target?
What is the goal of maintaining access in the hacking process?
What is the goal of maintaining access in the hacking process?
Which of the following attacks is an example of a Denial-of-Service (DoS) attack?
Which of the following attacks is an example of a Denial-of-Service (DoS) attack?
What is a countermeasure to prevent password cracking attacks?
What is a countermeasure to prevent password cracking attacks?
Which of the following is considered a human-based social engineering technique?
Which of the following is considered a human-based social engineering technique?
What does the term 'IP Spoofing' refer to?
What does the term 'IP Spoofing' refer to?
Flashcards are hidden until you start studying
Study Notes
Ethical Hacking Objectives
- Aimed at protecting systems by identifying vulnerabilities rather than causing harm.
- Distinction between ethical hackers (White Hats) and malicious hackers (Black Hats).
Types of Hackers
- Black Hat: Malicious hackers intending to break the law.
- White Hat: Ethical hackers working to protect systems by finding security flaws.
- Blue Hat: Security professionals hired to test systems.
- Red Hat: Offensive hackers targeting other hackers.
Phases of Ethical Hacking
- Scanning occurs during the scanning phase, crucial for identifying vulnerabilities.
Zero-Day Attacks
- An exploit targeting previously unknown vulnerabilities before they are patched.
Hacking Terminology
- Payload refers to malicious code delivered through an exploit.
Common Network Protocols
- HTTPS typically operates on port 443, ensuring secure web transactions.
Social Engineering Attacks
- Tailgating involves an attacker following someone into a secured area, bypassing access controls.
Scanning Techniques
- Ping Sweep identifies active hosts by sending ICMP packets, useful for network discovery.
Dumpster Diving
- The primary goal is to find sensitive information in discarded documents, often overlooked.
Password Cracking Methods
- Brute Force Attack attempts every possible character combination until the password is discovered.
Port Scanning Tools
- Nmap is a widely used tool for scanning open ports on a network.
Metasploit Framework
- Stager Payload in Metasploit creates a remote connection with the target system.
- Armitage, Payload, and Msfconsole are key components, while Nmap is not part of Metasploit.
VPN Definition
- VPN stands for Virtual Private Network, providing secure communication over the internet.
Firewall Bypassing Techniques
- SYN Scan uses specific TCP flags to navigate past firewalls, ensuring stealthy scanning.
Rootkits
- Rootkits provide unauthorized root-level access, often deployed to maintain control over compromised systems.
Privilege Escalation
- Vertical Privilege Escalation allows unauthorized users to gain higher access levels within a system.
IP Spoofing
- Used to mask the source IP address, misleading identification and bypassing network security.
Open Port Detection
- SYN Scan is commonly employed for detecting open ports on networks, crucial for security assessments.
Spear Phishing
- A targeted attack aimed at specific organizations or groups rather than random individuals.
Maintaining Access
- The goal is to ensure ongoing access to a compromised system for future exploitation.
Denial-of-Service (DoS) Attacks
- SYN Flooding is a classic example of DoS, designed to overwhelm and disrupt network services.
Preventing Password Cracking
- Strong passwords combined with encryption and multi-factor authentication serve as effective countermeasures.
Social Engineering Techniques
- Tailgating represents a direct human-based social engineering method, gaining unauthorized access through deception.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.