click below
click below
Normal Size Small Size show me how
Exam-Review 4/9/2021
Term | Definition |
---|---|
CYBER ATTACK "CYBER KILL CHAIN" PROCESS STEPS | 1- Reconnaissance 2- Weaponization 3- Delivery 4- Exploitation 5- Installation 6-Command & Control 7- Actions on Objects |
Reconnaissance | This is the FIRST STEP before the Attack begins & the process of COLLECTING INFORMATION on your target. MOST IMPORTANT. (COLLECTS INFORMATION ON TARGET) |
Weaponization | |
Delivery | |
Exploitation | |
Installation | |
Command & Control | |
Actions on Objects | |
intitle: (Google Advance Search) | Search in the page’s title. ( __: "Hacked" ) |
inurl: (Google Advance Search) | Search in the URL. ( __: cars ) |
filetype: (Google Advance Search) | Search for a specific file type. ( __: pdf "Cybersecurity" ) |
intext: (Google Advance Search) | Search in the page’s text. ( __: "computer virus" ) |
site: (Google Advance Search) | Search in a specific website. ( __: lifewire.com CPU ) |
Hostname | |
Hostname (Command) | A command that's used to view a computer's hostname and domain name (DNS) (Domain Name Service), and to display or set a computer's hostname or domain name. |
arp –a (Command) | This is a TCP/IP utility and Microsoft Windows command for viewing and modifying the local Address Resolution Protocol (ARP) cache, which contains recently resolved MAC addresses of Internet Protocol (IP) hosts on the network |