Professional Documents
Culture Documents
Eh 1
Eh 1
Eh 1
It ensures that
the entity trying to access a system or resource is who or what it claims to be. There are several types of
authentication methods:
Password-based authentication: Users provide a username and password to prove their
identity.
Biometric authentication: This involves using unique biological traits like fingerprints, iris scans,
or facial recognition to verify identity.
Token-based authentication: Users authenticate using a physical device, like a smart card or a
key fob.
Multi-factor authentication (MFA): This method requires users to provide two or more types of
authentication factors, such as something they know (password), something they have (token), or
something they are (biometric).
Single sign-on (SSO): Users authenticate once to gain access to multiple systems or applications.
9. Password cracking: Password cracking is the process of attempting to gain unauthorized access to a
system by guessing or breaking passwords. Various tools are used for password cracking, including:
John the Ripper: A widely-used password cracking tool that can perform dictionary attacks,
brute-force attacks, and more.
Hashcat: A powerful password recovery tool that supports various algorithms and attack modes.
Hydra: A popular online password cracking tool that supports various protocols such as HTTP,
FTP, SSH, etc.
Cain and Abel: A versatile tool that can perform various password cracking and network sniffing
tasks.
10. SQL injection: SQL injection is a type of cyber attack that allows an attacker to execute malicious SQL
statements in a web application's database. Types of SQL injection include:
In-band SQLi (Classic SQLi): This is the most common type where the attacker uses the same
communication channel to both launch the attack and gather results.
Out-of-band SQLi: Attackers use a different channel to launch the attack and gather results.
Blind SQLi: Attackers don't directly see the result of their actions, making it more challenging to
exploit, but still possible.
11. Vulnerabilities in SQL Server: Vulnerabilities in SQL Server refer to weaknesses or flaws in the SQL Server
software that can be exploited by attackers to gain unauthorized access, manipulate data, or disrupt
services. These vulnerabilities can include flaws in authentication mechanisms, SQL injection
vulnerabilities, buffer overflows, insecure configurations, etc.
12. Buffer overflow: Buffer overflow is a type of software vulnerability where an application writes more data
to a buffer than it can hold, causing the extra data to overflow into adjacent memory locations. Types of
buffer overflow include:
Stack-based buffer overflow: Overflows occur in the stack memory region.
Heap-based buffer overflow: Overflows occur in the heap memory region.
Integer overflow: Arithmetic operation results in a value that exceeds the range of representable
values for the data type.
13. Stack-based buffer overflow: In stack-based buffer overflow attacks, the attacker overflows a buffer
allocated on the stack, which can overwrite the return address of a function. By controlling the return
address, the attacker can redirect the execution flow of the program to malicious code.
14. Mutation in Exploit Hunting (EH): Mutation refers to the process of modifying an existing exploit to
create a new variant that bypasses detection mechanisms. Mutation techniques include changing code
obfuscation, altering exploit payloads, modifying exploit delivery methods, and manipulating exploit
signatures.
15. Wired Equivalent Privacy (WEP): WEP is a security protocol used to secure wireless computer networks.
It was the first security protocol defined in the IEEE 802.11 standard. WEP encrypts data transmitted
between wireless devices using a shared key. However, it is now considered weak and vulnerable to
various attacks.
16. Wireless Hacking Methods:
Packet sniffing and analysis
Brute force attacks on wireless encryption
Exploiting weaknesses in authentication protocols
Creating rogue access points
Denial of Service (DoS) attacks
17. Wired Equivalent Privacy (WEP): WEP was an early security algorithm for Wi-Fi networks intended to
provide wireless LANs with a level of security and privacy comparable to what is usually expected of a
wired LAN. However, due to its vulnerabilities, it's now considered insecure.
18. WPA Authentication Mechanism: Wi-Fi Protected Access (WPA) is a security standard for wireless
networks. It uses the Temporal Key Integrity Protocol (TKIP) for encryption and the Extensible
Authentication Protocol (EAP) for authentication. WPA provides stronger security than WEP by addressing
its vulnerabilities.
19. Wireless Sniffing: Wireless sniffing is the process of intercepting and analyzing data packets transmitted
over a wireless network. It involves capturing wireless network traffic using specialized tools like Wireshark
or tcpdump and analyzing the captured data to gain insights into network activity, including usernames,
passwords, and other sensitive information.
20. Rogue Access Point: A rogue access point is an unauthorized wireless access point that has been
installed on a network without the explicit consent of the network administrator. Rogue access points can
be used by attackers to intercept network traffic, launch attacks, or gain unauthorized access to the
network.
21. Password Hacking Techniques:
Brute Force Attack: Trying every possible combination until the correct one is found.
Dictionary Attack: Using a list of commonly used passwords or words from a dictionary.
Phishing: Tricking users into revealing their passwords by impersonating legitimate entities.
Social Engineering: Manipulating individuals into divulging their passwords through
psychological manipulation.
Keylogging: Recording keystrokes to capture passwords as they are entered.
Rainbow Table Attack: Precomputed tables of hashes to quickly reverse hashed passwords.
22. Types of Passwords:
Simple Passwords: Easy-to-guess passwords like "password", "123456", etc.
Complex Passwords: Strong passwords with a mix of uppercase, lowercase, numbers, and special
characters.
One-time Passwords (OTP): Temporary passwords used for a single login session or transaction.
Biometric Passwords: Passwords based on unique biological characteristics like fingerprints or
iris scans.
Passphrases: Longer sequences of words or phrases that are easier to remember but harder to
crack than traditional passwords.
23. Spyware Technologies: Spyware refers to software that secretly monitors and collects user information. It
can capture keystrokes, record browsing habits, steal passwords, and more. Spyware technologies include
keyloggers, screen capture software, webcam recorders, and data exfiltration tools.