Podcast
Questions and Answers
What is the main goal of the 'Gaining Access' stage in system hacking?
What is the main goal of the 'Gaining Access' stage in system hacking?
- To hide malicious activities
- To escalate privileges
- To gain unauthorized access to the system (correct)
- To clear logs
Which technique is NOT typically used for hiding files during a hacking attempt?
Which technique is NOT typically used for hiding files during a hacking attempt?
- Phishing (correct)
- Trojans
- Rootkits
- Steganography
What type of password attack involves directly communicating with the victim machine?
What type of password attack involves directly communicating with the victim machine?
- Non-Electronic Attacks
- Active Online Attacks (correct)
- Social Engineering
- Passive Online Attacks
Which of the following is an example of a Non-Electronic Attack?
Which of the following is an example of a Non-Electronic Attack?
Which of the following techniques is used in the 'Escalating Privileges' stage of system hacking?
Which of the following techniques is used in the 'Escalating Privileges' stage of system hacking?
What action can an attacker perform using a USB drive after exploiting PassView?
What action can an attacker perform using a USB drive after exploiting PassView?
Which of the following describes a replay attack?
Which of the following describes a replay attack?
What is a characteristic of wire sniffing as an attack method?
What is a characteristic of wire sniffing as an attack method?
What is the main purpose of a rainbow table in password cracking?
What is the main purpose of a rainbow table in password cracking?
Which of the following is NOT a recommended defense against password cracking?
Which of the following is NOT a recommended defense against password cracking?
What is a method to increase password security before encryption?
What is a method to increase password security before encryption?
What type of privilege escalation refers to gaining higher privileges than currently possessed?
What type of privilege escalation refers to gaining higher privileges than currently possessed?
Which of the following is a recommended defense against privilege escalation?
Which of the following is a recommended defense against privilege escalation?
What is the primary purpose of executing malicious applications during an attack?
What is the primary purpose of executing malicious applications during an attack?
Which password practice should be avoided to enhance security?
Which password practice should be avoided to enhance security?
What is the primary method used in a dictionary attack?
What is the primary method used in a dictionary attack?
What does a brute forcing attack primarily rely on?
What does a brute forcing attack primarily rely on?
Which of the following best describes the action performed during a password guessing attack?
Which of the following best describes the action performed during a password guessing attack?
What is a default password?
What is a default password?
How does a Trojan/Spyware/Keylogger attack typically operate?
How does a Trojan/Spyware/Keylogger attack typically operate?
An attacker uses offline attacks to crack passwords on the victim's machine directly.
An attacker uses offline attacks to crack passwords on the victim's machine directly.
In a dictionary attack, the software attempts to crack passwords by using a pre-defined list of words.
In a dictionary attack, the software attempts to crack passwords by using a pre-defined list of words.
Trojan/Spyware/Keylogger attacks do not require any action from the victim to collect user credentials.
Trojan/Spyware/Keylogger attacks do not require any action from the victim to collect user credentials.
Attackers often include default passwords in their lists for password guessing attacks.
Attackers often include default passwords in their lists for password guessing attacks.
Brute forcing attacks try every possible password combination until they find the correct one.
Brute forcing attacks try every possible password combination until they find the correct one.
Hiding files is a goal of system hacking aimed at concealing an attacker's activities.
Hiding files is a goal of system hacking aimed at concealing an attacker's activities.
A passive online attack involves directly communicating with the victim machine.
A passive online attack involves directly communicating with the victim machine.
Shoulder surfing is classified as a non-electronic password attack.
Shoulder surfing is classified as a non-electronic password attack.
Brute forcing attacks are a type of passive online attack.
Brute forcing attacks are a type of passive online attack.
The goal of escalating privileges in system hacking is to maintain remote access to the system.
The goal of escalating privileges in system hacking is to maintain remote access to the system.
Wire sniffing is relatively easy to perpetrate.
Wire sniffing is relatively easy to perpetrate.
A rainbow table contains precomputed hash values for passwords.
A rainbow table contains precomputed hash values for passwords.
In a replay attack, the attacker captures packets and re-sends authentication tokens to gain access.
In a replay attack, the attacker captures packets and re-sends authentication tokens to gain access.
PassView stores passwords in an encrypted format on the attacker’s USB drive.
PassView stores passwords in an encrypted format on the attacker’s USB drive.
To defend against password cracking, it is recommended to use passwords that can be found in a dictionary.
To defend against password cracking, it is recommended to use passwords that can be found in a dictionary.
Using a random string as a prefix or suffix with the password before encrypting is a recommended practice.
Using a random string as a prefix or suffix with the password before encrypting is a recommended practice.
Vertical privilege escalation involves assuming the identity of another user with the same privileges.
Vertical privilege escalation involves assuming the identity of another user with the same privileges.
Locking out an account after too many incorrect password guesses helps prevent brute force attacks.
Locking out an account after too many incorrect password guesses helps prevent brute force attacks.
Encrypting sensitive data is not a necessary defense against privilege escalation.
Encrypting sensitive data is not a necessary defense against privilege escalation.
Attackers may execute malicious applications to gather information or maintain unauthorized access to systems.
Attackers may execute malicious applications to gather information or maintain unauthorized access to systems.
Shoulder surfing is considered a type of active online password attack.
Shoulder surfing is considered a type of active online password attack.
Brute forcing attacks are primarily based on pre-defined lists of words.
Brute forcing attacks are primarily based on pre-defined lists of words.
The primary method used in password guessing attacks involves direct communication with the victim's system.
The primary method used in password guessing attacks involves direct communication with the victim's system.
A passive online attack allows an attacker to communicate with the authorizing party.
A passive online attack allows an attacker to communicate with the authorizing party.
Encrypting sensitive data is a recommended defense against password cracking.
Encrypting sensitive data is a recommended defense against password cracking.
PassView executed from a USB drive stores passwords in .TXT files on the targeted computer.
PassView executed from a USB drive stores passwords in .TXT files on the targeted computer.
Wire sniffing is considered relatively hard to perpetrate.
Wire sniffing is considered relatively hard to perpetrate.
A rainbow table attack can crack passwords easily by comparing captured hashes to a precomputed table.
A rainbow table attack can crack passwords easily by comparing captured hashes to a precomputed table.
A replay attack involves sending previously captured packets back onto the network to gain access.
A replay attack involves sending previously captured packets back onto the network to gain access.
An offline attack involves the attacker trying to crack passwords on their own system after copying the target's password file.
An offline attack involves the attacker trying to crack passwords on their own system after copying the target's password file.
In a brute forcing attack, the attacker makes educated guesses about the password based on prior knowledge.
In a brute forcing attack, the attacker makes educated guesses about the password based on prior knowledge.
To enhance security, it is advised to use system default passwords.
To enhance security, it is advised to use system default passwords.
Trojan/Spyware/Keylogger attacks collect user credentials by running in the background and sending data to the attacker.
Trojan/Spyware/Keylogger attacks collect user credentials by running in the background and sending data to the attacker.
Password guessing attacks have a high success rate due to the wide range of passwords used.
Password guessing attacks have a high success rate due to the wide range of passwords used.
Default passwords provided by manufacturers are often targeted in password guessing attacks.
Default passwords provided by manufacturers are often targeted in password guessing attacks.
Using encryption techniques to protect sensitive data is not a necessary defense against privilege escalation.
Using encryption techniques to protect sensitive data is not a necessary defense against privilege escalation.
Horizontal privilege escalation refers to gaining higher privileges than currently possessed.
Horizontal privilege escalation refers to gaining higher privileges than currently possessed.
Locking out an account after too many incorrect password guesses is an effective measure to prevent brute force attacks.
Locking out an account after too many incorrect password guesses is an effective measure to prevent brute force attacks.
Performing debugging using bounds checkers and stress tests is a recommended measure to defend against privilege escalation.
Performing debugging using bounds checkers and stress tests is a recommended measure to defend against privilege escalation.
Attackers executing malicious applications is called 'owning' the system.
Attackers executing malicious applications is called 'owning' the system.
What is the primary goal during the 'Executing Applications' stage of system hacking?
What is the primary goal during the 'Executing Applications' stage of system hacking?
Which technique is primarily associated with the 'Hiding Files' goal within system hacking?
Which technique is primarily associated with the 'Hiding Files' goal within system hacking?
What distinguishes passive online attacks from active online attacks in password cracking?
What distinguishes passive online attacks from active online attacks in password cracking?
Which type of attack is shoulder surfing categorized under?
Which type of attack is shoulder surfing categorized under?
What is a primary method used in the escalation of privileges during hacking?
What is a primary method used in the escalation of privileges during hacking?
What is a recommended method to limit potential privilege escalation in a system?
What is a recommended method to limit potential privilege escalation in a system?
Which type of privilege escalation involves assuming the same privileges of another user?
Which type of privilege escalation involves assuming the same privileges of another user?
Which password-related practice should be avoided to enhance security?
Which password-related practice should be avoided to enhance security?
How can servers best defend against brute force attacks on user accounts?
How can servers best defend against brute force attacks on user accounts?
What is one of the main purposes of executing malicious applications during an attack?
What is one of the main purposes of executing malicious applications during an attack?
What is a characteristic of a passive online attack such as wire sniffing?
What is a characteristic of a passive online attack such as wire sniffing?
Which of the following is a key step in performing a rainbow table attack?
Which of the following is a key step in performing a rainbow table attack?
What must an attacker typically possess to execute a Man-in-the-Middle (MITM) attack?
What must an attacker typically possess to execute a Man-in-the-Middle (MITM) attack?
What distinguishes a replay attack from other methods of password cracking?
What distinguishes a replay attack from other methods of password cracking?
Which attack involves using a list of potential passwords that have been ranked based on probability?
Which attack involves using a list of potential passwords that have been ranked based on probability?
What is the main function of a rainbow table in the context of an offline attack?
What is the main function of a rainbow table in the context of an offline attack?
Which option best describes a brute forcing attack?
Which option best describes a brute forcing attack?
In an active online attack using Trojan/Spyware/Keylogger, what is the first step taken by the attacker?
In an active online attack using Trojan/Spyware/Keylogger, what is the first step taken by the attacker?
What role do default passwords play in password guessing attacks?
What role do default passwords play in password guessing attacks?
The primary goal of escalating privileges in system hacking is to bypass access controls to gain initial access to the system.
The primary goal of escalating privileges in system hacking is to bypass access controls to gain initial access to the system.
Wire sniffing is an example of an active online attack where the attacker communicates directly with the victim's machine.
Wire sniffing is an example of an active online attack where the attacker communicates directly with the victim's machine.
Social engineering is classified as a non-electronic attack that requires technical knowledge.
Social engineering is classified as a non-electronic attack that requires technical knowledge.
Brute forcing attacks involve systematically trying every possible password combination until the correct one is found.
Brute forcing attacks involve systematically trying every possible password combination until the correct one is found.
The clearing of logs is an activity aimed at covering tracks during system hacking.
The clearing of logs is an activity aimed at covering tracks during system hacking.
Vertical privilege escalation refers to acquiring the same level of privileges that already has been granted.
Vertical privilege escalation refers to acquiring the same level of privileges that already has been granted.
Implementing multi-factor authentication and authorization can help defend against privilege escalation attacks.
Implementing multi-factor authentication and authorization can help defend against privilege escalation attacks.
Running users and applications on the least privileges is not a recommended strategy against privilege escalation.
Running users and applications on the least privileges is not a recommended strategy against privilege escalation.
An attacker may execute malicious programs remotely to maintain unauthorized access to a system by 'owning' it.
An attacker may execute malicious programs remotely to maintain unauthorized access to a system by 'owning' it.
A privilege separation methodology is used to increase the scope of programming errors and bugs.
A privilege separation methodology is used to increase the scope of programming errors and bugs.
In a dictionary attack, the attacker relies solely on the specific knowledge of the target's password history to create the dictionary file.
In a dictionary attack, the attacker relies solely on the specific knowledge of the target's password history to create the dictionary file.
The failure rate for password guessing attacks is typically low due to the structured approach the attacker takes in creating potential passwords.
The failure rate for password guessing attacks is typically low due to the structured approach the attacker takes in creating potential passwords.
Trojan/Spyware/Keylogger attacks necessitate active participation from the victim to collect user credentials successfully.
Trojan/Spyware/Keylogger attacks necessitate active participation from the victim to collect user credentials successfully.
Using pre-computed hashes, such as those in a rainbow table, is not applicable in offline attacks as they rely on real-time interaction with the target's system.
Using pre-computed hashes, such as those in a rainbow table, is not applicable in offline attacks as they rely on real-time interaction with the target's system.
Default passwords are commonly utilized by attackers in dictionary attacks to increase the success rate of their password guessing efforts.
Default passwords are commonly utilized by attackers in dictionary attacks to increase the success rate of their password guessing efforts.
In a wire sniffing attack, the captured data may include sensitive information such as passwords and emails, making it easy to recover them.
In a wire sniffing attack, the captured data may include sensitive information such as passwords and emails, making it easy to recover them.
A replay attack is characterized by an attacker acquiring access to communication channels between the victim and server to extract information.
A replay attack is characterized by an attacker acquiring access to communication channels between the victim and server to extract information.
Setting a password change policy to 30 days is a recommended defense against password cracking.
Setting a password change policy to 30 days is a recommended defense against password cracking.
PassView is designed to save passwords in an encrypted format, ensuring their security when stored on a USB drive.
PassView is designed to save passwords in an encrypted format, ensuring their security when stored on a USB drive.
Rainbow table attacks rely on precomputed tables containing a list of possible passwords and their hash values, making it easier to crack passwords.
Rainbow table attacks rely on precomputed tables containing a list of possible passwords and their hash values, making it easier to crack passwords.
Which of the following techniques is primarily used in the 'Hiding Files' stage of system hacking?
Which of the following techniques is primarily used in the 'Hiding Files' stage of system hacking?
Shoulder surfing is an example of an active online attack.
Shoulder surfing is an example of an active online attack.
What is the main goal of the 'Escalating Privileges' stage in system hacking?
What is the main goal of the 'Escalating Privileges' stage in system hacking?
In password cracking, _____ attacks involve the attacker trying to gain access without communicating with the victim machine.
In password cracking, _____ attacks involve the attacker trying to gain access without communicating with the victim machine.
Match the following types of password attacks with their descriptions:
Match the following types of password attacks with their descriptions:
Which method allows an attacker to collect user credentials from a victim's machine without the victim's knowledge?
Which method allows an attacker to collect user credentials from a victim's machine without the victim's knowledge?
A dictionary attack relies on a predefined list of common passwords to attempt access.
A dictionary attack relies on a predefined list of common passwords to attempt access.
What is a common use of default passwords by attackers?
What is a common use of default passwords by attackers?
In a brute forcing attack, the software tries every possible __________ until the password is cracked.
In a brute forcing attack, the software tries every possible __________ until the password is cracked.
Which of the following methods is used to gain access during a replay attack?
Which of the following methods is used to gain access during a replay attack?
Match the following password attack methods with their descriptions:
Match the following password attack methods with their descriptions:
Wire sniffing is considered easy to perpetrate.
Wire sniffing is considered easy to perpetrate.
What is the primary purpose of a rainbow table in relation to password cracking?
What is the primary purpose of a rainbow table in relation to password cracking?
The attacker executes _____ to extract stored passwords when using PassView.
The attacker executes _____ to extract stored passwords when using PassView.
Match the type of attack with its description:
Match the type of attack with its description:
What is a primary defense against privilege escalation?
What is a primary defense against privilege escalation?
Vertical privilege escalation allows an attacker to acquire the same level of privileges as another user.
Vertical privilege escalation allows an attacker to acquire the same level of privileges as another user.
What should be done to an account that has too many incorrect password attempts?
What should be done to an account that has too many incorrect password attempts?
Using a random string as a ______ or suffix with the password enhances security before encryption.
Using a random string as a ______ or suffix with the password enhances security before encryption.
Match the types of privilege escalation with their definitions:
Match the types of privilege escalation with their definitions:
Flashcards
System Hacking Goals
System Hacking Goals
The objectives of a hacker during the system hacking phase, including gaining access, escalating privileges, executing applications, hiding files, and covering tracks, each with respective techniques like password cracking or trojan use
Password Cracking Techniques
Password Cracking Techniques
Methods used to recover passwords, encompassing non-electronic (like social engineering), active online (like brute-force), and passive online (like sniffing) attacks. These approaches exploit system vulnerabilities to breach security.
Non-Electronic Attacks
Non-Electronic Attacks
Password cracking methods that do not require technical skills. These attacks heavily rely on social engineering tactics.
Active Online Attacks
Active Online Attacks
Signup and view all the flashcards
System Hacking Methodology (CHM)
System Hacking Methodology (CHM)
Signup and view all the flashcards
Dictionary Attack
Dictionary Attack
Signup and view all the flashcards
Brute-Force Attack
Brute-Force Attack
Signup and view all the flashcards
Password Guessing Attack
Password Guessing Attack
Signup and view all the flashcards
Default Password Attack
Default Password Attack
Signup and view all the flashcards
Trojan/Spyware/Keylogger Attack
Trojan/Spyware/Keylogger Attack
Signup and view all the flashcards
Password Cracking (BAT)
Password Cracking (BAT)
Signup and view all the flashcards
Wire Sniffing
Wire Sniffing
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Rainbow Table Attack
Rainbow Table Attack
Signup and view all the flashcards
Man-in-the-Middle (MITM) Attack
Man-in-the-Middle (MITM) Attack
Signup and view all the flashcards
Privilege Escalation
Privilege Escalation
Signup and view all the flashcards
Vertical Privilege Escalation
Vertical Privilege Escalation
Signup and view all the flashcards
Horizontal Privilege Escalation
Horizontal Privilege Escalation
Signup and view all the flashcards
Executing Malicious Applications
Executing Malicious Applications
Signup and view all the flashcards
Password Security Practices
Password Security Practices
Signup and view all the flashcards
What are the stages of CHM?
What are the stages of CHM?
Signup and view all the flashcards
What is a brute-force attack?
What is a brute-force attack?
Signup and view all the flashcards
What is the goal of escalating privileges?
What is the goal of escalating privileges?
Signup and view all the flashcards
What are some examples of non-electronic password attacks?
What are some examples of non-electronic password attacks?
Signup and view all the flashcards
What is the purpose of hiding files?
What is the purpose of hiding files?
Signup and view all the flashcards
Offline Password Attack
Offline Password Attack
Signup and view all the flashcards
Running services as unprivileged accounts
Running services as unprivileged accounts
Signup and view all the flashcards
Restricting interactive logon privileges
Restricting interactive logon privileges
Signup and view all the flashcards
What is a Rainbow Table Attack?
What is a Rainbow Table Attack?
Signup and view all the flashcards
What is Wire Sniffing?
What is Wire Sniffing?
Signup and view all the flashcards
What is a Replay Attack?
What is a Replay Attack?
Signup and view all the flashcards
What is a BAT attack?
What is a BAT attack?
Signup and view all the flashcards
What is a Man-in-the-Middle Attack?
What is a Man-in-the-Middle Attack?
Signup and view all the flashcards
Password Cracking
Password Cracking
Signup and view all the flashcards
Escalating Privileges
Escalating Privileges
Signup and view all the flashcards
SYSKEY Encryption
SYSKEY Encryption
Signup and view all the flashcards
Shoulder Surfing
Shoulder Surfing
Signup and view all the flashcards
Offline Attack
Offline Attack
Signup and view all the flashcards
Brute Forcing Attack
Brute Forcing Attack
Signup and view all the flashcards
Rule-based Attack
Rule-based Attack
Signup and view all the flashcards
Man-in-the-Middle Attack (MITM)
Man-in-the-Middle Attack (MITM)
Signup and view all the flashcards
What are the goals of system hacking?
What are the goals of system hacking?
Signup and view all the flashcards
What are some password cracking techniques?
What are some password cracking techniques?
Signup and view all the flashcards
What is the purpose of escalating privileges?
What is the purpose of escalating privileges?
Signup and view all the flashcards
What is privilege escalation?
What is privilege escalation?
Signup and view all the flashcards
USB-based Password Cracking
USB-based Password Cracking
Signup and view all the flashcards
Man-in-the-Middle Attack
Man-in-the-Middle Attack
Signup and view all the flashcards
Salt
Salt
Signup and view all the flashcards
SYSKEY
SYSKEY
Signup and view all the flashcards
Password Guessing
Password Guessing
Signup and view all the flashcards
Passive Online Attack
Passive Online Attack
Signup and view all the flashcards
What is a Man-in-the-Middle (MITM) attack?
What is a Man-in-the-Middle (MITM) attack?
Signup and view all the flashcards
Study Notes
System Hacking Module 05
- System hacking module 5 is titled "Unmask the Invisible Hacker"
- The module covers information gathered before the system hacking stage, system hacking goals, and CEH hacking methodology.
- Information at Hand Before System Hacking Stage:
- Footprinting Module: IP Range, Namespace, Employees
- Scanning Module: Target assessment, Identified systems, Identified services
- Enumeration Module: Intrusive probing, User lists, Security flaws
- System Hacking Goals:
- Gaining Access: Bypassing access controls to access the system using password cracking and social engineering techniques
- Escalating Privileges: Acquiring the rights of another user or administrator through exploiting known system vulnerabilities
- Executing Applications: Creating and maintaining remote access to the system using Trojans, spywares, backdoors, and keyloggers
- Hiding Files: Hiding attackers' malicious activities and data theft via rootkits and steganography
- Covering Tracks: Hiding evidence of compromise through clearing logs
CEH Hacking Methodology (CHM)
- Footprinting, scanning, enumeration are steps in the methodology
- Gaining access leads to cracking passwords, escalating privileges, executing applications, hiding files, and covering tracks
- Clearing logs is a step in CHM
Password Cracking
- Password cracking techniques are used to recover passwords from computer systems
- Attackers use these techniques to gain unauthorized access to vulnerable systems
- The success of most password cracking techniques is often attributed to weak or easily guessable passwords
Types of Password Attacks
- Non-Electronic Attacks: Attackers don't need technical knowledge to crack passwords, such as shoulder surfing, social engineering, and dumpster diving
- Active Online Attacks: Attackers directly communicate with the victim's machine to crack passwords, including dictionary and brute-force attacks, and hash injection and phishing
- Passive Online Attacks: Attackers crack passwords without direct communication with the victim, like password guessing, and wire sniffing
- Offline Attacks: Attackers copy the target's password file and crack passwords in their own system, such as rainbow table attacks
Active Online Attack: Dictionary, Brute Forcing, and Rule-based Attack
- Dictionary Attack: Uses a dictionary file to crack passwords, running against user accounts.
- Brute Forcing Attack: Tries different combinations of characters until the password is broken.
- Rule-based Attack: Used when the attacker has some information about the password to predict the password
Active Online Attack: Password Guessing
- Attackers create a list of possible passwords, often gathered through social engineering or other means
- The list is then used to try and crack passwords through manual attempts
- Passwords are ranked from high to low probability
- Attackers attempt to key in each password until they discover the correct password
Default Passwords
- Default passwords are those supplied by manufacturers on new equipment (e.g., switches, routers)
- Attackers use lists of default passwords in password-guessing attacks
- Online tools help identify default passwords
Active Online Attack: Trojan/Spyware/Keylogger
- Attackers install Trojan/Spyware/Keylogger on victims' machines to collect usernames and passwords
- These programs run in the background and send user credentials to the attacker
- Attacker perspective: Infects victim's device with Trojan/Spyware/Keylogger, sending login credentials
- Victim perspective: Logs on to a domain server with credentials
- Domain server perspective: Access granted
Example of Active Online Attack Using USB Drive
- Attacker inserts USB drive
- Autorun window pops up
- Contents of
launch.bat
run - Password-cracking tool
PassView
executed in background - Passwords stored in
.TXT
files on USB drive - Download
PassView
password hacking tool - Copy downloaded files to USB drive
Passive Online Attack: Wire Sniffing
- Attackers run packet sniffer tools to access and record raw network traffic
- Information like passwords and emails can be captured
- Sniffed credentials are used to gain unauthorized access
Passive Online Attacks: Man-in-the-Middle and Replay Attack
- MITM attack: Attacker intercepts communication channels between victim and server.
- Information is extracted during this process
- In replay attacks, packets and authentication tokens are captured and replayed to gain access
Offline Attack: Rainbow Table Attack
- Precomputed table storing password hashes to quickly decipher passwords.
- Hash values compared with precomputed hashes to recover passwords
How to Defend against Password Cracking
- Enable information security audits
- Use unique passwords during password change
- Avoid sharing passwords
- Never use easily guessable/dictionary passwords
- Avoid cleartext and protocols with weak encryption
- Implement complex password change policy, eg., 30 days
- Keep passwords in secure locations
- Do not use default passwords
How to Defend against Password Cracking (Cont'd)
- Use 8-12 alphanumeric characters
- Use uppercase and lowercase letters, numbers, and symbols
- Ensure apps don't save passwords in memory or disk
- Employ a random string (salt) for password encryption
- Enable SYSKEY for strong password encryption in SAM database
- Avoid sensitive passwords like DOB, names, etc.
- Monitor server logs for brute-force attacks
- Lock out accounts subject to too many incorrect guesses
Privilege Escalation
- Gaining administrative privileges on a network (non-admin account) after initial access
- Exploits design flaws, programming errors, network configuration issues
- Allows attackers to gain administrative access for critical/sensitive data, file deletions, malicious program installation
How to Defend Against Privilege Escalation
- Restrict interactive logon privileges
- Employ encryption to protect data.
- Minimize the amount of code that runs with privileges
- Use multi-factor authentication and authorization
- Implement services with reduced privileges
- Use debugging tools for bounds checkers
- Thoroughly test application code, eg., errors and bugs
- Implement privilege separation methodology to limit errors/bugs
- Patch/update systems regularly
Executing Applications
- Attackers execute various malicious applications to gain access to systems resources
- Techniques include keyloggers, spywares, backdoors, and crackers remotely in victim machines
- These programs may gather information, exploit vulnerabilities, gain access to system resources, and enable access to system resources
Keyloggers
- Keyloggers are programs/hardware devices that monitor keystrokes, logging onto files or transmitted to a remote location
- Keyloggers gather information like emails, passwords, credit card numbers, etc
- Legitimate uses include office/industrial monitoring
- Keyloggers can target chat sessions, IRC, and instant messaging
How to Defend Against Keyloggers
- Use pop-up blockers
- Install up-to-date antivirus/anti-spyware
- Install firewall software with anti-keylogging features
- Recognize and avoid phishing emails
- Use strong passwords, frequently changed, for various online accounts
- Avoid opening junk/doubtful emails
Spyware
- Spyware programs record user activities and interactions, sending information to remote attackers
- Hides processes, files to avoid detection/removal
- Similar to Trojan horses (malicious programs) which are bundled in free software/downloads
- Collects information like email addresses, passwords, credit card numbers, sensitive details, etc
- Attacker: installs spyware on victim system and receives information.
- Victim: unaware of spyware activities. This may compromise user credentials.
How to Defend Against Spyware
- Avoid potentially compromised computer systems
- Be wary of suspicious emails and websites.
- Update software/firewalls regularly
- Regularly check task manager and config manager reports
- Install and use anti-spyware software
- Carefully read privacy policies and license agreements before downloading or installing applications
- Avoid personal information input to unverified systems
Rootkits
- Rootkits hide their presence and attackers' malicious activity within systems
- Replaces OS calls/utilities with their own modified versions
- Compromises target system security
- Typically includes backdoors, DDoS programs, packet sniffers, log-wiping utilities, and more
Steganography
- Steganography is hiding a secret message within an ordinary message
- Utilizing graphics/images as primary method to conceal data
Covering Tracks
- Intrusive users try to hide their activities on the compromised system.
- Methods include disabling auditing, clearing logs, and manipulating logs to avoid detection
Disabling Auditing
- Intruders disable auditing immediately after gaining administrator privileges
- They then restore auditing using
auditpol.exe
if needed - This method is to avoid tracking.
Clearing Logs
- Attackers use
clearlogs.exe
utility to erase security, system, and application logs. - Metasploit: attacker can use the Metasploit's meterpreter shell to wipe out all logs via command prompt.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.