Uploaded by dwenkel

CEHv8 Study Guide

advertisement
CEHv8 Study Guide











TCP/IP Flags
o # CWR ECE URG ACK PSH RST SYN FIN
# CWR - Congestion Window Reduced
# ECE - Explicit Congestion Notification echo
# URG - Urgent
# ACK - Acknowledgement
# PSH - Push
# RST - Reset
# SYN - Synchronize
# FIN - Finished
What three scans don’t work against Windows?
o FIN, XMAS, and NULL
o Windows machines give no response, even if a port is closed, which violates RFC 793
Three-way TCP handshake
o SYN, SYN/ACK, ACK
Loose source routing
o Loose Source Routing is a technique whereby the sender of a packet can specify the
route that a packet should take through the network. This enables a hacker to read
traffic without being the ultimate destination.
IDLE scan
o Allows port scanning without sending a single packet to the target directly from the
hackers IP address. Open and closed ports are detected by observing “fragment
identification” number changes on a zombie machine.
FTP Bounce Scan
o Tricks an FTP server into scanning a host, thus maintaining the anonymity of the
attacker.
SYN scan
o In a SYN scan, only SYN packets are sent, not ACK packets, so it is stealthy – not
appearing as a completed connection in firewall logs.
Connect Scan
o Forms a complete TCP connection. It is the most reliable form of scanning.
Three types of scanning
o Port
o Network
o Vulnerability
IP Fragments
o IP fragments are packets which carry only part of a TCP packet, and must be
reassembled. They can be used to evade network intrusion detection.
Daisy chaining















o Hackers who get away with database threat
SOAP (Simple Object Access Protocol)
o A protocol for exchanging XML-based messages using HTTP or SMTP as the transport.
SAM (Security Accounts Manager)
o A database of usernames, passwords, and permissions in the Windows architecture.
Null session
o An unauthenticated connection to a network share by an anonymous user on an
unidentified system.
NOP
o A command that tells the processor to do nothing. Almost all processors have a NOP
instruction that performs a null operation. In the Intel architecture, the NOP instruction
is one byte long and translates to 0x90 in machine code. A long run of NOP instructions
is called a NOP slide or sled. The CPU does nothing until it gets back to the main event
(which precedes the return pointer).
Honeynet
o An entire virtual network that is presented as a large honeypot.
HFS = Hierarchical File System
o A file system used in Mac OS X. It stores data in a top to bottom organization structure.
HTTP Commands
o GET = request a file from a web server
Firewalking
o A method to collect information about a remote network protected by a firewall. Uses
trace route-like IP packet analysis to determine whether a data packet can pass through
the packet-filtering device/ firewall from the attackers host to the victims host.
Extended Stack Pointer (ESP)
o A location identifier used to access parameters passed into a subroutine as arguments.
Calling Procedure
o A software routine that passes control to a different software routine. When these
routines exist on separate computers, the systems often use Remote Procedure Call
(RPC) libraries. Also refers to function calls and subroutines.
Banner Grabbing
o A technique that enables a hacker to identify the type of OS or app. Request for a
banner often uses legit connection requests such as Telnet.
Daemon
o A background program that resides on a computer and services requests.
Cross-Site Scripting
o A computer security exploit that is used to execute a malicious script.
COBIT
o
OWSAP
o















Ettercap
Kismet
Aircrack-ng
Hping3
SSLstrip
CSRF (Cross Site Request Forgery)
Burp Cross Site Request Forgery Testing
Wireshark screenshot
o
John the Ripper
o
Cain and Abel
o
rc5 vs md5
o
sc query command
o
metasploit payload
o
Snort
o
pivot attacks
o
Download