Ethical Hacking - Unit 1 Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best defines 'Authentication'?

  • A method to assess the risk level of an asset
  • The approval process for authorized users
  • A process by which a person proves their identity (correct)
  • A measure of resource accessibility

What does the term 'Attack Surface' refer to?

  • The hardware vulnerabilities present in a system
  • The collection of executable software services that can be exploited (correct)
  • The total number of attacks a system has experienced
  • The physical area of a network exposed to potential breaches

Which of the following represents a component of the CIA triad?

  • Integrity (correct)
  • Reliability
  • Authenticity
  • Accessibility

What characterizes 'Malware'?

<p>Malicious software inserted for harmful purposes (A)</p> Signup and view all the answers

What is meant by 'Vulnerability' in the context of information security?

<p>Weaknesses in hardware or software that can be exploited (D)</p> Signup and view all the answers

Which type of rootkit modifies the core components of the operating system?

<p>Kernel-Level Rootkit (C)</p> Signup and view all the answers

What is 'Risk' in terms of information security?

<p>The likelihood of a resource being attacked (A)</p> Signup and view all the answers

What is a primary function of an encrypted virus?

<p>It encrypts itself to prevent detection. (A)</p> Signup and view all the answers

What is the main action performed by Cross-site scripting (XSS)?

<p>Inject malicious scripts into web pages (D)</p> Signup and view all the answers

How do polymorphic viruses primarily avoid detection?

<p>By constantly rewriting their own code. (D)</p> Signup and view all the answers

Which option best describes 'Authorization'?

<p>The specification of access levels for authorized users (B)</p> Signup and view all the answers

What are common storage media that need protection?

<p>Hard Drives, SD cards, and CD-ROMs (B)</p> Signup and view all the answers

Which of the following is a common countermeasure against Cross-site request forgery (CSRF)?

<p>Validate cookies, query strings, and form fields (B)</p> Signup and view all the answers

What is a common way Trojans can affect a user's system?

<p>They monitor user activity without consent. (C)</p> Signup and view all the answers

Which of the following accurately describes rootkits?

<p>They are designed to provide privileged access. (C)</p> Signup and view all the answers

What kind of attack allows an attacker to perform actions on behalf of an authenticated user without their consent?

<p>Cross-site request forgery (CSRF) (B)</p> Signup and view all the answers

Which characteristic isNOT typical of spyware?

<p>Creating backdoors for remote access. (B)</p> Signup and view all the answers

In SQL injection, what is the purpose of entering '1=1' in an SQL query?

<p>To return all records in the database (C)</p> Signup and view all the answers

What important feature distinguishes metamorphic viruses from polymorphic viruses?

<p>They completely rewrite their code with each infection. (D)</p> Signup and view all the answers

Which type of rootkit is typically embedded within the hardware or firmware of components?

<p>Hardware/Firmware Level Rootkit (A)</p> Signup and view all the answers

Which of the following is a characteristic of adware?

<p>It displays unwanted advertisements. (B)</p> Signup and view all the answers

What is one consequence of a successful SQL injection attack?

<p>Gaining unauthorized access to sensitive data (A)</p> Signup and view all the answers

Hypervisor Level Rootkits exploit which of the following?

<p>Hardware-assisted Virtualization features (D)</p> Signup and view all the answers

Which statement best describes stealth viruses?

<p>They hide themselves from detection by antivirus software. (B)</p> Signup and view all the answers

What can result from failures in the access control mechanism?

<p>Data destruction or modification (B)</p> Signup and view all the answers

Which of the following is NOT a common access control vulnerability?

<p>Viewing account history with guest access (C)</p> Signup and view all the answers

What is a potential consequence of insufficient logging and monitoring?

<p>Difficulty in detecting malicious activities (A)</p> Signup and view all the answers

Which OWASP Top 10 Mobile Threat relates to poorly executed coding practices during development?

<p>M2: Inadequate Supply Chain Security (B)</p> Signup and view all the answers

How can XML External Entities be exploited?

<p>By including hostile content in XML documents (D)</p> Signup and view all the answers

Which of the following best defines Insufficient Binary Protections in mobile applications?

<p>Retention of sensitive information within the binary (A)</p> Signup and view all the answers

What type of vulnerability is associated with allowing changes to primary keys in databases?

<p>Data Integrity Violations (C)</p> Signup and view all the answers

Which OWASP mobile threat is concerned with the security of data stored within the app?

<p>M9: Insecure Data Storage (B)</p> Signup and view all the answers

What is the method used in whaling attacks?

<p>Targeting specific individuals within an organization for sensitive information. (B)</p> Signup and view all the answers

How do fake WAPs typically lure users to connect to them?

<p>By using names that appear trustworthy. (A)</p> Signup and view all the answers

What characterizes in-band SQL injection?

<p>It utilizes the same channel for both attack and result gathering. (A)</p> Signup and view all the answers

What common security measure can help protect against eavesdropping attacks?

<p>Using a VPN. (C)</p> Signup and view all the answers

How does error-based SQL injection work?

<p>It elicits error messages from the database to gather structural information. (A)</p> Signup and view all the answers

What primarily enables a man-in-the-middle (MITM) attack to occur?

<p>The presence of unsecured networks. (B)</p> Signup and view all the answers

What is a key characteristic of a session hijacking attack?

<p>It allows attackers to take control of a user's active session. (B)</p> Signup and view all the answers

What is the primary goal of a time-based SQL injection attack?

<p>To force the server to delay its response. (B)</p> Signup and view all the answers

Which method is NOT a recommended prevention technique for SQL injection?

<p>Ignoring user input validation. (D)</p> Signup and view all the answers

Which of the following is NOT a method to protect against fake WAPs?

<p>Always connecting to public networks. (C)</p> Signup and view all the answers

What role does ARP poisoning play in a MITM attack?

<p>It allows attackers to position themselves between the victim and the host. (D)</p> Signup and view all the answers

What happens in blind Boolean-based SQL injections?

<p>Attackers obtain responses based on true or false conditions. (D)</p> Signup and view all the answers

Which type of attack uses fake text messages to deceive individuals into revealing information?

<p>Smishing. (B)</p> Signup and view all the answers

What does credential stuffing attack utilize?

<p>A standard list of default usernames and passwords. (A)</p> Signup and view all the answers

Which of the following is a characteristic of broken authentication?

<p>It compromises session tokens, passwords, and other identifiers. (C)</p> Signup and view all the answers

What is one reason prepared statements protect against SQL injection?

<p>They separate SQL logic from user input. (A)</p> Signup and view all the answers

Flashcards

Asset

Any resource that needs protection from attackers. Examples include computers, communication equipment, and storage media.

Access Control

Defines who has access to what resources and to what extent.

CIA Triad

A set of principles that ensure information is kept private (confidentiality), accurate (integrity), and available to those who need it (availability).

Authentication

The process of proving one's identity. Examples include using passwords, cards, tokens, or biometrics.

Signup and view all the flashcards

Authorization

Specifies the type of access authorized users have to specific resources.

Signup and view all the flashcards

Risk

The chance that an asset might be attacked. Involves analyzing and quantifying the potential risks.

Signup and view all the flashcards

Threat

The dangers or threats a system faces from attackers. Examples include snooping, traffic analysis, modification, masquerading, replaying, repudiation, and denial of service.

Signup and view all the flashcards

Vulnerability

Weaknesses or loopholes in hardware, software, applications, or protocols that can be exploited by attackers to cause harm.

Signup and view all the flashcards

Encrypted Virus

A type of virus where a hidden key is used to encrypt the rest of its code. The key is embedded within the virus and then unlocks the remaining part of the virus after infecting a system. This technique helps the virus avoid detection by security checks.

Signup and view all the flashcards

Stealth Virus

This virus hides its presence from detection by antivirus software. It can be difficult to locate and remove.

Signup and view all the flashcards

Polymorphic Virus

A virus that changes its form with each infection. It mutates to disguise itself, making it challenging to detect using traditional antivirus methods.

Signup and view all the flashcards

Metamorphic Virus

A virus that completely rewrites itself when it infects a system, modifying its internal workings and behavior. It's a more advanced form of a polymorphic virus.

Signup and view all the flashcards

Trojan

A malicious program disguised as something harmless or beneficial. It tricks users into installing it, then secretly grants hackers unauthorized access to their computer.

Signup and view all the flashcards

Spyware

Software designed to collect personal information about users without their consent. This information can be used for targeted advertising, identity theft, or other malicious purposes.

Signup and view all the flashcards

Rootkit

A set of programs that grants remote users privileged access to a system. It's usually installed after an initial attack and allows hackers to take control of an infected system.

Signup and view all the flashcards

Adware

A type of spyware that displays advertisements on your computer.

Signup and view all the flashcards

XML External Entities

Exploiting vulnerable XML processors by uploading XML or injecting malicious content in an XML document.

Signup and view all the flashcards

Insufficient Logging and Monitoring

Occurs when security-critical events are not logged properly, making malicious activities difficult to detect.

Signup and view all the flashcards

Access Control Vulnerabilities

Occurs when an attacker can bypass access control checks by manipulating URLs, changing user IDs, or accessing unauthorized parts of the system.

Signup and view all the flashcards

Inadequate Supply Chain Security

A vulnerability caused by a lack of testing and secure coding practices that leads to security flaws in the app.

Signup and view all the flashcards

Insecure Authentication/Authorization

Insecure authentication or authorization mechanisms in an app, allowing unauthorized access.

Signup and view all the flashcards

Insufficient Input/Output Validation

Lack of validation of user input and output, which can lead to vulnerabilities like SQL injection and cross-site scripting (XSS).

Signup and view all the flashcards

Insecure Communication

Using insecure communication channels like HTTP instead of HTTPS, allowing attackers to intercept sensitive information.

Signup and view all the flashcards

Insecure Data Storage

Mobile apps that lack secure storage mechanisms for sensitive data, exposing it to potential attacks.

Signup and view all the flashcards

In-band SQLi

A type of SQL injection where the hacker uses the same communication channel to both launch the attack and gather results.

Signup and view all the flashcards

Error-based SQLi

A SQL injection technique that exploits database errors to retrieve information about the database structure.

Signup and view all the flashcards

Blind Boolean-based SQLi

An SQL injection method where the attacker forces the database to return a true or false result, allowing them to deduce information about the database.

Signup and view all the flashcards

Time-based SQL Injection

An SQL injection attack where the attacker crafts a query that makes the server wait for a specific time before responding. The attacker then measures this time delay to deduce information.

Signup and view all the flashcards

Prepared Statements

Pre-compiled SQL statements that separate SQL logic from user input, preventing malicious code from being executed.

Signup and view all the flashcards

Restrict Database Rights

Restricting user access to only the information they need to perform their tasks.

Signup and view all the flashcards

Vulnerability Assessments and Pentesting

Regularly testing your systems for vulnerabilities and weaknesses to identify potential security risks.

Signup and view all the flashcards

Credential Stuffing

An attack where someone tries to guess passwords or usernames using a list of commonly used credentials.

Signup and view all the flashcards

Application Level Rootkit

A type of rootkit that modifies application files to change their behavior, often to hide malware or gain unauthorized access.

Signup and view all the flashcards

Kernel-Level Rootkit

A type of rootkit that alters the core operating system files, often to gain complete control over the system.

Signup and view all the flashcards

Hardware/Firmware Level Rootkit

A type of rootkit that hides within the hardware or firmware of devices, making it incredibly difficult to detect.

Signup and view all the flashcards

Hypervisor Level Rootkit

A type of rootkit that exploits virtualization technology to create a hidden, unauthorized environment within a host system.

Signup and view all the flashcards

Cross-Site Scripting (XSS)

A web vulnerability that allows attackers to inject malicious scripts into websites, potentially stealing data or compromising user accounts.

Signup and view all the flashcards

Cross-Site Request Forgery (CSRF)

A web attack that forces a user to unknowingly submit malicious requests to a website, often to compromise their account or steal sensitive information.

Signup and view all the flashcards

SQL Injection (SQLi)

A type of attack that exploits security flaws in database queries to gain unauthorized access to sensitive data.

Signup and view all the flashcards

Improper Data Validation

A vulnerability where attackers can manipulate data submitted through web forms to trigger unexpected actions or gain unauthorized access.

Signup and view all the flashcards

Smishing

A type of phishing attack that uses fake text messages to trick people into giving up sensitive information or downloading malware.

Signup and view all the flashcards

Whaling

A phishing attack that specifically targets high-profile individuals within organizations, aiming to gain access to valuable information.

Signup and view all the flashcards

Fake WAP

A deceptive Wi-Fi network created by hackers to mimic legitimate hotspots, allowing them to intercept user data.

Signup and view all the flashcards

Eavesdropping

An attack where the attacker listens in on and records data being transmitted between two devices, often on unsecured networks.

Signup and view all the flashcards

Man-in-the-Middle (MITM)

An attack where the hacker positions themselves between a user and a website, intercepting and potentially manipulating the communication.

Signup and view all the flashcards

Session Hijacking

An attack where the attacker steals or guesses the session token, gaining control of a user's online session.

Signup and view all the flashcards

Study Notes

Ethical Hacking - Unit 1

  • This unit covers ethical hacking
  • A graphic displays a figure running, with a money sack, against a black background with the words "ETHICAL HACKING" and "UNIT 1"
  • Another graphic shows a figure breaking into a phone graphic, the word "Information Security" and "Attacks and Vulnerabilities"

Introduction to Information Security

  • Assets: Any resource needing protection from attackers.
  • System Resources:
    • Computer Equipment (Desktops, Laptops, Tablets, Servers)
    • Communication Equipment (Routers, Switches, Firewalls, Modems)
    • Storage Media (Hard Drives, CDs, DVDs, SD cards)
  • Access Control: Defines the spectrum of access granted to entities.
  • Confidentiality, Integrity, and Availability (CIA): Ensuring data privacy, consistency from origin to destination, and availability to users 24/7.

Authentication and Authorization

  • Authentication: Process where a person proves their identity (passwords, cards, biometrics).
  • Authorization: Specifies the access levels for authorized users to resources.
  • Risk: The chances of a resource or asset being attacked.
  • Risk Analysis: Determines the level of risk associated with system assets.
  • Threat: The amount of danger the system faces from attackers.
  • Threat Types: Snooping, Traffic Analysis, Modification, Masquerading, Replaying, Denial of Service,

Vulnerability and Attack Surface

  • Vulnerability: System weaknesses or loopholes in hardware, software, applications, and protocols exploited by attackers.
  • Attack Surface: The combination of software services an attacker can exploit due to vulnerabilities or insecure configurations.
  • Malware: Malicious software intentionally included or inserted into a system for harmful purposes.

Types of Malware

  • Worms: Self-replicating malware that spreads across networks without a host program.
  • Viruses: Malware that attaches itself to programs and replicates copies of itself.
    • Structure: Has infection mechanism, trigger, and payload.
    • Phases: Dormant, propagation, triggering, execution.
    • Types: Encrypted, Stealth, Polymorphic, Metamorphic
  • Trojans: Malware disguised as legitimate software, while secretly executing unwanted tasks.
    • Possible damages: Data theft, system crashes, slowdowns, launchpads for DDoS attacks, remotely run commands, keystroke interception.
  • Spyware: Software for gathering user interaction information and details without permission.
  • Adware: Spyware that displays advertisements.
  • System Monitors: Spyware that monitors system activities.
  • Tracking Cookies: Spyware that collects data about user behavior on the Internet.
  • Rootkits: Software designed to provide privileged access to a remote user.
    • Types: Application level, kernel level, hardware/firmware level, hypervisor level

Types of Vulnerabilities (Identified by OWASP)

  • Cross-Site Scripting (XSS): Injects malicious scripts into web pages.
  • Cross-Site Request Forgery (CSRF/XSRF): Tricks users into performing unwanted actions on a website.
  • SQL Injection (SQLI): Inserts harmful SQL code to access data or control the system.
    • Types: In-band, Error-based, Blind Boolean-based, Time-based
  • Broken Authentication: Vulnerable authentication that allows attackers to compromise credentials, tokens, etc.
  • Input Parameter Manipulation: Modifies data between the browser and web application.

Types of Attacks & Prevention Mechanisms

  • Keystroke Logging: Records keystrokes covertly, either by software or hardware.
  • Denial of Service (DoS): Prevents normal communication with a resource by overwhelming requests.
  • Distributed Denial of Service (DDoS): Same as DoS, but uses multiple computers or machines.
  • Watering Hole Attack: Targets trusted services to deliver a malicious payload to an organization.
  • Brute-Force Attack: Uses trial-and-error to crack passwords/credentials.
  • Phishing : Tries to acquire sensitive data like bank account info, emails, passwords and credit card information
  • Cat Phishing : Includes creating a fake personality to steal personal data
  • Voice Phishing (Vishing): Malicious calls to steal sensitive data
  • SMS Phishing (Smishing) : Uses fake mobile texts to trick people into downloading malware,
  • Whaling : Targets high-profile individuals,
  • Fake WAP: Mimic legitimate Wi-Fi hotspots
  • Eavesdropping : Passively observing communications between devices.
  • Man-in-the-Middle (MITM): Places a hacker in between the communication channels

Other attack types

  • Session Hijacking: Stealing sensitive information by hijacking a valid online session.
  • Clickjacking: Tricks users into clicking on different objects(link) than what they intended to click.
  • URL Obfuscation : Modifies a URL to conceal the legitimate location

Other security aspects

  • Buffer Overflow: When more data than allocated is put into a buffer, leading to data corruption.
  • DNS Cache Poisoning : Modifies DNS cache to point to a false IP address
  • ARP Poisoning : Changes the relationship between IP address and MAC address to redirect traffic to a attacker's machine
  • Identity Theft: Stealing personal information to commit fraud.
  • IoT Attacks: Gaining access to sensitive data via Internet of Things (IoT) devices.
  • Bots and Botnets: Automated malicious software and networks of infected computers.
  • CVE Database: Centralized database of common vulnerabilities and exposures in software and hardware.

Additional Information

  • OWASP Mobile Top 10: List of top 10 mobile security threats identified by Open Web Application Security Project (OWASP).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Ethical Hacking UNIT 1 PDF

More Like This

Ethical Hacking (lect 1-2)
8 questions
Ethical Hacking Methodologies and Laws
25 questions
Use Quizgecko on...
Browser
Browser