Uploaded by dwenkel

CEH v7 notes

advertisement
CEH v7 and v8 Notes



Terms
o
Bit flipping = integrity attack, predictable outcomes
o
Tiger team = group of people testing a system
o
TOE = target of evaluation
o
Threat = can harm or cause loss to IT asset
o
Vulnerability = weakness exploited by a threat
o
FISMA = gov’t framework for security
3 main phases
o
Preparation
o
Assessment
o
Conclusion
5 stages of a hack
o
Recon
o
Scanning and enumeration
o
Gaining access (then escalation of privledges)
o
Maintaining access
o
Covering tracks

Cisco Aironet default username/password: Cisco/Cisco

websites



o
www.wigle.net
o
www.fastandeasyhacking.com (Armitage)
o
www.sectools.org
Google search
o
Site:
o
Cache:
o
Intitle:
o
inURL:
Cryptography
o
XOR (exclusive Or) = stream cipher, very fast, key length important
o
Block vs stream ciphers = what is difference?
o
Salt = adding random bits to a hashing algorithm
Linux
o
Single user mode = super user account

Must be physically at machine

“linux single” = command

Sidejacking = replay cookies for passwords and SSL

ADS = alternate data streaming, hide files inside files

Disgruntled employee is single biggest threat

Physical security
o
Physical measures: locks, lighting
o
Technical measures: authentication
o
Operational measures: policies, procedures

Binary = even numbers end in 0, odd numbers end in 1

XSS
o
Know what indicators of XSS are in URL

Karens Cookie Viewer

Tools

o
Nmap
o
Netcat = swiss army knife of TCPIP hacking
o
Dig = Domain Information Groper (simulates a DNS server)
o
Nessus = most common vulnerability scanner
o
Metasploit
o
Ettercap = packet sniffer, like Wireshark
o
Snort
o
Hping3 commands



RA flag = reset/closed
Null session?
Web Pages
o
CGI = Common Gateway Interface, can run scripts, all run as same user
o
SSI = Server Side Includes, inside HTML but evaluated on server
o
Parameter tampering = URL tampering
Check
o
TCP Flags
o
ICMP codes
o
Nmap codes (Quizlet)
SQL
o

SA flag = open
Enumeration
o


Single quote begins SQL injection attempts
Wireless
o
Rogue access points = mis-association attack
o
Mac spoofing tools = TMAC, MAC




o
BSA = footprint, basic service area
o
BSS = basic service set
o
ESS = extended service set, with multiple AP, moving AP’s is roaming
Bluetooth
o
Bluesniffing
o
Bluesmacking
o
Bluescarfing
o
Bluejacking
Viruses
o
Sigverif
o
Tripwire
o
HK-local machine
o
Sheepdip system = standalone AV checker computer
o
Stages of virus life?
Attacks
o
Phlashing = flashing or bricking a system, physical damage
o
Session hijacking = see sequence numbers increasing with ACK (see pg 300 AIO)
o
Review pg 304 AIO
Assessments
o
o
o
Security assessment = any test of security on a network or system

Security audit = vulnerability assessment (find but don’t test)

Penetration test = verification requires trying it
Types of penetration tests

External = analyzes publically available information

Internal assessment = within organization

Black box = no prior knowledge of infrastructure at all, longest to do

Grey box = limited knowledge

White box = internal knowledge of org
Phases

Pre-attack

Attack


Penetrate

Acquire targets

Execute attack

Elevate privledges
Post-attack

Remove

Restore


1 - 2 - types of nmap scans and their responsese
3 - ICMP codes
4 - TCP handshake
6 - dig syntax
7 - hping2 syntax
8 - wireshark syntax
9 - wireshark output
10 - snort syntax
11 - block/stream cipher
13 - hashing
14 - LANMan Hash
15 - How many bits is xyz encryption?
16 - MAC authentication
17 - DHCP snooping
18 - SQL injection
19 - XSS
Download