click below
click below
Normal Size Small Size show me how
Exam-Review 4/9/2021
| Term | Definition |
|---|---|
| CYBER ATTACK "CYBER KILL CHAIN" PROCESS STEPS | 1- Reconnaissance 2- Weaponization 3- Delivery 4- Exploitation 5- Installation 6-Command & Control 7- Actions on Objects |
| Reconnaissance | This is the FIRST STEP before the Attack begins & the process of COLLECTING INFORMATION on your target. MOST IMPORTANT. (COLLECTS INFORMATION ON TARGET) |
| Weaponization | |
| Delivery | |
| Exploitation | |
| Installation | |
| Command & Control | |
| Actions on Objects | |
| intitle: (Google Advance Search) | Search in the page’s title. ( __: "Hacked" ) |
| inurl: (Google Advance Search) | Search in the URL. ( __: cars ) |
| filetype: (Google Advance Search) | Search for a specific file type. ( __: pdf "Cybersecurity" ) |
| intext: (Google Advance Search) | Search in the page’s text. ( __: "computer virus" ) |
| site: (Google Advance Search) | Search in a specific website. ( __: lifewire.com CPU ) |
| Hostname | |
| Hostname (Command) | A command that's used to view a computer's hostname and domain name (DNS) (Domain Name Service), and to display or set a computer's hostname or domain name. |
| arp –a (Command) | This is a TCP/IP utility and Microsoft Windows command for viewing and modifying the local Address Resolution Protocol (ARP) cache, which contains recently resolved MAC addresses of Internet Protocol (IP) hosts on the network |