CHAPTER 4 : SYSTEM HACKING

Jetzt loslegen. Gratis!
oder registrieren mit Ihrer E-Mail-Adresse
CHAPTER 4 : SYSTEM HACKING von Mind Map: CHAPTER 4 : SYSTEM HACKING

1. How to countermeasure rootkit

1.1. Protect those machines

1.2. If you have been infected, the first thing you should do is shut that machine off! Then, remove the drive

2. Buffer overflow attack

2.1. what ?

2.1.1. occurs when a program or process attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold

2.2. can occur inadvertently, but it can also be caused by a malicious actor sending carefully crafted input to a program that then attempts to store the input in a buffer that isn't large enough for that input

3. Attacks that can be used to gain password

3.1. redirecting SMB logon to attacker

3.1.1. Eavesdropping on LM responses becomes much easier if the attacker can trick the victim to attempt Windows authentication of the attacker's choice.

3.1.2. Basic trick is to send an email message to the victim with an embedded hyperlink to a fraudulent SMB server.

3.2. SMB relay MITM

3.2.1. attack that involves intercepting SMB traffic and relaying the NTLM authentication handshakes to a target host.

3.3. NETBIOS DOS attack

3.3.1. This attack could pose a moderate security threat. It does not require immediate action.

4. Types of Privilige Escalation

4.1. Horizontal

4.1.1. escalation requires the attacker to use the same level of privileges he already has been granted, but assume the identity of another user with similar privileges.

4.1.2. For example, someone gaining access to another person's online banking account would constitute horizontal privilege escalation.

4.2. vertical

4.2.1. escalation requires the attacker to grant himself higher privileges

4.2.2. This is typically achieved by performing kernel-level operations that allow the attacker to run unauthorized code.