• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
TCP \ IP FLAGS
# CWR ECE URG ACK PSH RST SYN FIN
# CWR - Congestion Window Reduced
# ECE - Explicit Congestion Notification echo
# URG - Urgent
# ACK - Acknowledgement
# PSH - Push
# RST - Reset
# SYN - Synchronize
# FIN – Finished
TCP \ IP FLAGS
# CWR ECE URG ACK PSH RST SYN FIN
# CWR - Congestion Window Reduced
# ECE - Explicit Congestion Notification echo
# URG - Urgent
# ACK - Acknowledgement
# PSH - Push
# RST - Reset
# SYN - Synchronize
# FIN – Finished
What is fingerprinting?
Fingerprinting is discovering the operating system running on a target system by scanning.
What is an IDLE scan?
An IDLE scan allows port scanning without sending a single packet to the target directly from the hacker's IP address. Open and closed ports are detected by observing "fragment identification" number changes on a "zombie" machine.
What are the three types of scanning?
Port scanning, network scanning, and vulnerability scanning.
What is a connect scan?
A connect scan forms a complete TCP connection. It is the most reliable form of scanning.
What is network scanning?
Network scanning is sending packets to a range of addresses, to identify active hosts.
What is a SYN scan?
In a SYN scan, only SYN packets are sent, not ACK packets, so it is stealthy--not appearing as a completed connection in firewall logs.
What is an FTP Bounce scan?
An FTP Bounce scan tricks an FTP server into scanning a host, thus maintaining the anonymity of the attacker.
What is port scanning?
Port scanning is sending a series of packets to one computer to learn what services are running, often using the well-known port numbers.
What is firewalk?
Firewalk uses traceroute-like techniques to find firewalls and determine the filter rules they are using.
What is the three-way TCP handshake?
SYN, SYN/ACK, ACK.
What three scans don't work against Microsoft Windows?
FIN, XMAS, and NULL. Windows machines give no response, even if a port is closed, which violates RFC 793.
What are IP Fragments?
IP fragments are packets which carry only part of a TCP packet, and must be reassembled. They can be used to evade network intrusion detection.
What is loose source routing?
: Loose Source Routing is a technique whereby the sender of a packets can specify the route that a packet should take through the network. This enables a hacker to read traffic without being the ultimate destination.
An Attack
An assualt on the system security dervied from an intelligent threat.
Hack value
it is the notion among hackers that somthing is workth doing or is interesting
target of evaluaton
an IT system, product.
exploit
a defined way to breach the security of any IT systems through vunerablitity.
security
a state of well-being of information and infrastructure in wich the possibleity of theft, tampering is kept low.
daisy chaining
hackers who get away with database threat.
black hat
individuals with extraodrinary computer skills, resorting to malicious or destructive activities and are also know as crackers
white hats
individuals professing hackerskills and using them for defensive purposes and are alos know as security analysts
suicide hackers
individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for thier actions
gray hats
individuals who work both offensivelvy and defensivley at various times.