Podcast
Questions and Answers
What is the primary goal of the reconnaissance phase in an attack?
What is the primary goal of the reconnaissance phase in an attack?
What type of attack involves modifying the source address of packets to bypass firewall rules?
What type of attack involves modifying the source address of packets to bypass firewall rules?
What is the term for the ability to influence the behavior of a group of people?
What is the term for the ability to influence the behavior of a group of people?
What type of attack involves sending more data to an application than is expected?
What type of attack involves sending more data to an application than is expected?
Signup and view all the answers
Which type of attack involves creating a fake web page to persuade users to enter sensitive information?
Which type of attack involves creating a fake web page to persuade users to enter sensitive information?
Signup and view all the answers
What type of attack involves taking over a session between two individuals?
What type of attack involves taking over a session between two individuals?
Signup and view all the answers
Who is typically involved in an insider attack?
Who is typically involved in an insider attack?
Signup and view all the answers
What is the goal of the maintaining access phase in an attack?
What is the goal of the maintaining access phase in an attack?
Signup and view all the answers
What is the goal of a password attack?
What is the goal of a password attack?
Signup and view all the answers
What is a Trojan Horse?
What is a Trojan Horse?
Signup and view all the answers
What is the primary goal of a ransomware attack?
What is the primary goal of a ransomware attack?
Signup and view all the answers
What is a zombie in the context of cyber security?
What is a zombie in the context of cyber security?
Signup and view all the answers
What is the primary difference between a virus and a worm?
What is the primary difference between a virus and a worm?
Signup and view all the answers
What is the goal of a denial of service (DoS) attack?
What is the goal of a denial of service (DoS) attack?
Signup and view all the answers
What is a common use of zombie computers?
What is a common use of zombie computers?
Signup and view all the answers
What is a major issue with permanently connected systems?
What is a major issue with permanently connected systems?
Signup and view all the answers
Study Notes
Reconnaissance and Scanning
- Attacker gathers information about a target to launch an attack
- Scan for open ports, operating systems, applications, and services
Gaining Access
- Hacker exploits the system to gain unauthorized access
- Hacker may use social engineering tactics to trick users
Maintaining Access and Covering Tracks
- Hacker tries to retain access to the system
- May harden the system against other hackers
- Hacker covers tracks to remain undetected for a long time
Social Engineering Attacks
- Phishing: fake web page to steal sensitive information (username, password, credit cards)
- Hijack attack: hacker takes over a session and disconnects the other individual
- Insider attack: involves a disgruntled employee attacking the network
- Spoof attack: hacker modifies source address to bypass firewall rules
Types of Attacks
- Buffer overflow attack: sends more data than expected, gaining administrative access
- Password attack: tries to crack passwords stored in a network account database
- Dictionary attack: uses a list of words to crack passwords
- Brute-force attack: tries all possible combinations to crack passwords
- Hybrid attack: combination of dictionary and brute-force attacks
Malware and Viruses
- Backdoor or trapdoor: secret entry point into a program, often used by developers
- Trojan horse: program with hidden side-effects, allows attackers to indirectly gain access
- Virus: malicious software attached to another program, propagates itself and carries a payload
- Worms: replicating malware that spreads over a network, often used to create zombie PCs
- Zombie: program that secretly takes over another networked computer, used to launch distributed denial of service (DDoS) attacks
Ransomware and Denial of Service Attacks
- Ransomware: malware that locks a computer or encrypts data, demands a ransom to restore access
- DoS attack: denies service to users by consuming host resources (memory, processor cycles) and network resources (bandwidth)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the different phases of hacking, including reconnaissance, scanning, gaining access, maintaining access, and covering tracks. Understand the tactics and techniques used by hackers to compromise a system.