Professional Documents
Culture Documents
rated A+
✓ Reconnaissance
2. Weaponization
-----------------------------
3. Delivery
4. Exploitation
5. Installation
6. Command and Control
7. Actions on Objective
✓ Target Discovery
2. Fingerprinting / Enumeration
3. Port Scanning
4. Gaining Access
5. Privilege Escalation
6. Post Exploitation
Critical Information Assets: proprietary information, intellectual property, processes and plans,
credentials, org chart
✓ -Behavioral Analysis
-Context Awareness
-Multifactor Authenticaiton
✓ -Phishing
-Whaling
-Watering hole
-Baiting
-Pretexting
✓ -Ping Flood
-Ping of Death
-Syn Flood
-Smurf Attack
Internal Exploitation
External Exploitation
✓ Most common
Easily detected
Often guarded against
Shellcode
✓ a small piece of code used as the payload in the exploitation of a software vulnerability that
when executed spawns a shell. Used in buffer overflow attacks
Payload
✓ the part of the private user text which could also contain malware such as worms or viruses
which performs the malicious action
Buffer Overload
✓ Occurs when more data is put into a fixed-length buffer than the buffer can handle, and the
extra data holds instructions for malicious actions
NOP sled
✓ a hacker sends a large number of NOP instructions into the buffer, appending command code
instruction at the end.
*a string of x90 characters
Privilege Escalation
✓ Vertical or Horizontal
Methods:
-SAM file in windows
-/etc/passwd in linux
-sensitive info in shared folders
-weak permissions on processes
Persistence
✓ Allows for continued and future access to the exploited target by bypassing normal
requirements.
✓ -Netcat
-Meterpreter
-Registry
✓ -HTTP/HTTPS
-FTP
-DNS