Hacking Phases and Techniques

UnfetteredDwarf avatar
UnfetteredDwarf
·
·
Download

Start Quiz

Study Flashcards

16 Questions

What is the primary goal of the reconnaissance phase in an attack?

To gather information about the target

What type of attack involves modifying the source address of packets to bypass firewall rules?

Spoof attack

What is the term for the ability to influence the behavior of a group of people?

Social engineering

What type of attack involves sending more data to an application than is expected?

Buffer overflow attack

Which type of attack involves creating a fake web page to persuade users to enter sensitive information?

Phishing attack

What type of attack involves taking over a session between two individuals?

HiJack attack

Who is typically involved in an insider attack?

A disgruntled employee

What is the goal of the maintaining access phase in an attack?

To retain ownership of the system

What is the goal of a password attack?

To gain administrative access to the system

What is a Trojan Horse?

A program with hidden side-effects, allowing indirect access

What is the primary goal of a ransomware attack?

To lock or encrypt data, demanding a ransom in return

What is a zombie in the context of cyber security?

A program that secretly takes over another networked computer

What is the primary difference between a virus and a worm?

A virus requires user interaction, while a worm does not

What is the goal of a denial of service (DoS) attack?

To crash the system and consume resources

What is a common use of zombie computers?

To launch a distributed denial of service attack

What is a major issue with permanently connected systems?

Lack of security against denial of service attacks

Study Notes

Reconnaissance and Scanning

  • Attacker gathers information about a target to launch an attack
  • Scan for open ports, operating systems, applications, and services

Gaining Access

  • Hacker exploits the system to gain unauthorized access
  • Hacker may use social engineering tactics to trick users

Maintaining Access and Covering Tracks

  • Hacker tries to retain access to the system
  • May harden the system against other hackers
  • Hacker covers tracks to remain undetected for a long time

Social Engineering Attacks

  • Phishing: fake web page to steal sensitive information (username, password, credit cards)
  • Hijack attack: hacker takes over a session and disconnects the other individual
  • Insider attack: involves a disgruntled employee attacking the network
  • Spoof attack: hacker modifies source address to bypass firewall rules

Types of Attacks

  • Buffer overflow attack: sends more data than expected, gaining administrative access
  • Password attack: tries to crack passwords stored in a network account database
  • Dictionary attack: uses a list of words to crack passwords
  • Brute-force attack: tries all possible combinations to crack passwords
  • Hybrid attack: combination of dictionary and brute-force attacks

Malware and Viruses

  • Backdoor or trapdoor: secret entry point into a program, often used by developers
  • Trojan horse: program with hidden side-effects, allows attackers to indirectly gain access
  • Virus: malicious software attached to another program, propagates itself and carries a payload
  • Worms: replicating malware that spreads over a network, often used to create zombie PCs
  • Zombie: program that secretly takes over another networked computer, used to launch distributed denial of service (DDoS) attacks

Ransomware and Denial of Service Attacks

  • Ransomware: malware that locks a computer or encrypts data, demands a ransom to restore access
  • DoS attack: denies service to users by consuming host resources (memory, processor cycles) and network resources (bandwidth)

Learn about the different phases of hacking, including reconnaissance, scanning, gaining access, maintaining access, and covering tracks. Understand the tactics and techniques used by hackers to compromise a system.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser