100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH V10 System Hacking | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Add to cart

Exam (elaborations)

CEH V10 System Hacking | Questions And Answers Latest {} A+ Graded | 100% Verified

 1 view  0 purchase
  • Course
  • Top Academic Resources 2024/2025
  • Institution
  • Top Academic Resources 2024/2025

CEH V10 System Hacking | Questions And Answers Latest {} A+ Graded | 100% Verified

Preview 4 out of 41  pages

  • August 20, 2024
  • 41
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
oneclass
CEH V10 System Hacking | Questions And Answers Latest {2024- 2025} A+ Graded |
100% Verified


Footprinting - The process of accumulating data regarding a specific network environment.



In the this phase, the attacker creates a profile of the target organization, obtaining information such as
its IP address range, namespace, and employees.



This eases the process of system hacking by revealing its vulnerabilities. For example, the organization's
website may provide employee bios or a personnel directory, which the hacker can use it for social
engineering purposes. Conducting a Whois query on the web can provide information about the
associated networks and domain names related to a specific organization.



Scanning - The procedure for identifying active hosts, open ports, and unnecessary services enabled on
particular hosts.



Attackers use different types of scanning, such as port scanning, network scanning, and vulnerability
scanning of target networks or systems, which help in identifying possible vulnerabilities.



Scanning procedures such as port scanning and ping sweep return information about the services
offered by the live hosts that are active on the Internet, and their IP addresses.



Enumeration - This is a method of intrusive probing, through which attackers gather information such as
network user lists, routing tables, security flaws, and Simple Network Management Protocol (SNMP)
data.



This is significant, because the attacker ranges over the target territory to glean information about the
network, and shared users, groups, applications, and banners.



This involves making active connections to the target system or subjecting it to direct queries. Normally,
an alert and secure system will log such attempts.

,Often, the information gathered is publicly available anyway, such as a DNS address; however, it is
possible that the attacker might stumble upon a remote IPC share, such as IPC$ in Windows, that can be
probed with a null session, thus allowing shares and accounts to be enumerated



Escalate privileges in the Windows operating system - The Windows operating system uses Windows
application compatibility framework called Shim to provide compatibility between the older and newer
versions of Windows. An attacker can use these shims to perform different attacks such as disabling
Windows defender, privilege escalation, installing backdoors, and so on.



Discretionary Access Control (DAC) - This access controls determine the access controls taken by any
possessor of an object in order to decide the access controls of the subjects on those objects.



The other name for this is a need-to-know access model. It permits the user, who is granted access to
information, to decide how to protect the information and the level of sharing desired. Access to files is
restricted to users and groups based upon their identity and the groups to which the users belong.



System Hacking Goals - Gain Access- Once attackers succeed in gaining access to the system, they are
free to perform malicious activities such as stealing sensitive data, implementing a sniffer to capture
network traffic, and infecting the system with malware.

-At this stage, attackers use techniques such as password cracking and social engineering tactics to gain
access to the target system.



Escalating Privileges- After gaining access to a system using a low-privileged normal user account,
attackers may then try to increase their administrator privileges to perform protected system
operations, so that they can proceed to the next level of the system hacking phase: to execute
applications. Attackers exploit known system vulnerabilities to escalate user privileges



Executing apps-Once attackers have administrator privileges, they attempt to install malicious programs
such as Trojans, Backdoors, Rootkits, and Keyloggers, which grant them remote system access, thereby
enabling them to execute malicious codes remotely.

-Installing Rootkits allows them to gain access at the operating system level to perform malicious
activities. To maintain access for use at a later date, they may install Backdoors.



Hiding files- root kits (Lives in Kernal below OS where anitvirus software doesn't scan), steganography

,-Attackers use Rootkits and steganography techniques to attempt to hide the malicious files they install
on the system, and thus their activities.



Covering tracks -To remain undetected, it is important for attackers to erase all evidence of security
compromise from the system. To achieve this, they might modify or delete logs in the system using
certain log-wiping utilities, thus removing all evidence of their presence.



Mandatory Access Control (MAC): - This determine the usage and access policies of the users. Users can
access a resource only if that particular user has the access rights to that resource.



IT finds its application in the data marked as highly confidential.



The network administrators impose this, depending on the operating system and security kernel. It does
not permit the end user to decide who can access the information, and does not permit the user to pass
privileges to other users as the access could then be circumvented.



Role Based Access Control (RBAC): - In this access control, the access permissions are available based on
the access policies determined by the system.



The access permissions are out of user control, which means that users cannot amend the access
policies created by the system.



Users can be assigned access to systems, files, and fields on a one-to-one basis whereby access is
granted to the user for a particular file or system.



It can simplify the assignment of privileges and ensure that individuals have all the privileges necessary
to perform their duties.



Rule-Based Access Control (RuBAC) - :In this access control, the end point devices such as firewalls
verifies the request made to access the network resources against a set of rules. These rules generally
include IP addresses, port numbers, etc.

, Types of USB Attacks - USB Dumper -copies the files and folders from the flash drive silently when it
connected to the pc. It transfer the data from a removable USB drive to a directory named 'USB' by
default, with an option to change it.



USB Grabber -allows users to connect any analogue audio/video source to the system through a USB
port.



USB Sniffer -monitors the activity of USB ports on the system.



USB Snoopy- is a sort of viewer of the USB traffic.



CEH Hacking Methodology (CHM) - Gaining Access

Maintaining Access

Clearing tracks



Types of Password Attacks - Non-electronic (shoulder surf, social engineering, dumpster diving)



Active online (dictionary attack(pre-defined passwords), brute force, hash injection, phishing, trojan,
spyware etc)



Passive online (sniffing, man-in-the-middle, replay)



Offline (rainbow table (table of pre-computed hashes), distributed network attack(using other
computers around the world to crack a password))



Non Electronic Attack - Social Engineering- Convincing people to reveal password



Shoulder Surfing -Watching user login



Dumpster Diving-Dig through trash for sensitive info

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.48
  • (0)
  Add to cart