Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
TCP \ IP FLAGS
# CWR ECE URG ACK PSH RST SYN FIN # CWR - Congestion Window Reduced # ECE - Explicit Congestion Notification echo # URG - Urgent # ACK - Acknowledgement # PSH - Push # RST - Reset # SYN - Synchronize # FIN – Finished |
TCP \ IP FLAGS
# CWR ECE URG ACK PSH RST SYN FIN # CWR - Congestion Window Reduced # ECE - Explicit Congestion Notification echo # URG - Urgent # ACK - Acknowledgement # PSH - Push # RST - Reset # SYN - Synchronize # FIN – Finished |
|
What is fingerprinting?
|
Fingerprinting is discovering the operating system running on a target system by scanning.
|
|
What is an IDLE scan?
|
An IDLE scan allows port scanning without sending a single packet to the target directly from the hacker's IP address. Open and closed ports are detected by observing "fragment identification" number changes on a "zombie" machine.
|
|
What are the three types of scanning?
|
Port scanning, network scanning, and vulnerability scanning.
|
|
What is a connect scan?
|
A connect scan forms a complete TCP connection. It is the most reliable form of scanning.
|
|
What is network scanning?
|
Network scanning is sending packets to a range of addresses, to identify active hosts.
|
|
What is a SYN scan?
|
In a SYN scan, only SYN packets are sent, not ACK packets, so it is stealthy--not appearing as a completed connection in firewall logs.
|
|
What is an FTP Bounce scan?
|
An FTP Bounce scan tricks an FTP server into scanning a host, thus maintaining the anonymity of the attacker.
|
|
What is port scanning?
|
Port scanning is sending a series of packets to one computer to learn what services are running, often using the well-known port numbers.
|
|
What is firewalk?
|
Firewalk uses traceroute-like techniques to find firewalls and determine the filter rules they are using.
|
|
What is the three-way TCP handshake?
|
SYN, SYN/ACK, ACK.
|
|
What three scans don't work against Microsoft Windows?
|
FIN, XMAS, and NULL. Windows machines give no response, even if a port is closed, which violates RFC 793.
|
|
What are IP Fragments?
|
IP fragments are packets which carry only part of a TCP packet, and must be reassembled. They can be used to evade network intrusion detection.
|
|
What is loose source routing?
|
: Loose Source Routing is a technique whereby the sender of a packets can specify the route that a packet should take through the network. This enables a hacker to read traffic without being the ultimate destination.
|
|
An Attack
|
An assualt on the system security dervied from an intelligent threat.
|
|
Hack value
|
it is the notion among hackers that somthing is workth doing or is interesting
|
|
target of evaluaton
|
an IT system, product.
|
|
exploit
|
a defined way to breach the security of any IT systems through vunerablitity.
|
|
security
|
a state of well-being of information and infrastructure in wich the possibleity of theft, tampering is kept low.
|
|
daisy chaining
|
hackers who get away with database threat.
|
|
black hat
|
individuals with extraodrinary computer skills, resorting to malicious or destructive activities and are also know as crackers
|
|
white hats
|
individuals professing hackerskills and using them for defensive purposes and are alos know as security analysts
|
|
suicide hackers
|
individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for thier actions
|
|
gray hats
|
individuals who work both offensivelvy and defensivley at various times.
|