-
Notifications
You must be signed in to change notification settings - Fork 88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update 06_System_Hacking.md #8
base: master
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Read the comments and correct it.
Thanks, my grammar was (or still?) awful.
|
||
##### Dictionary Attack | ||
|
||
A password cracking application is used along with with a dictionary file. | ||
This dictionary file contains entire dictionary or a list of known and common words. | ||
A password-cracking application is used along with a dictionary file. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pasword cracking is without dash. See: https://en.wikipedia.org/wiki/Password_cracking
Domain controller responds to a challenge known as **nonce** to be encrypted by the password's hash. | ||
This challenge is a 16 byte random number generated ny the domain controller. | ||
By comparing the challenge with the database, domain controller permit or deny the login. | ||
This challenge is a 16-byte random number generated by the domain controller. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You are love dashes 😃
@@ -368,17 +368,17 @@ Features: | |||
|
|||
### Rootkits | |||
|
|||
Rootkit is a software designed to provide privileged access to a remote user over a system, creates a backdoor. | |||
Deployed after attacker gain high-level access to a system. | |||
A rootkit is software designed to provide privileged access to a remote user over a system, creates a backdoor. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"A rootkit is a software ..." maybe.
Rootkits often mask their existence to avoid detection. | ||
|
||
#### Types | ||
|
||
- **Application level rootkit**: perform manipulation of standard application file with an injection of codes. | ||
- **Application-level rootkit**: perform manipulation of standard application file with an injection of codes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Dash! 😃
See: https://www.omnisecu.com/security/rootkits.php
Rootkits often mask their existence to avoid detection. | ||
|
||
#### Types | ||
|
||
- **Application level rootkit**: perform manipulation of standard application file with an injection of codes. | ||
- **Application-level rootkit**: perform manipulation of standard application file with an injection of codes. | ||
- **Kernel-level rootkit**: inject malicious code to the kernel |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mine is wrong too. It should be "Kernel level rootkit".
|
||
#### Offline Attack | ||
|
||
##### Pre-computed hashes and Rainbow table | ||
|
||
Comparing a password using a rainbow table. | ||
Rainbow Table is the pregenerated hashes of the words in a dictionary or the combination of characters. | ||
The advantage of Rainbow Table is the speed, because it takes less time to compare the hashes. | ||
Rainbow Table is the pre-generated hashes of the words in a dictionary or the combination of characters. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pregenerate is without dash. See: https://en.wiktionary.org/wiki/pregenerate
|
||
#### Password Guessing | ||
|
||
The attacker uses the information extracted by initial phases and guess the password. | ||
Not common method and the rate of failure is high. | ||
Not a common method and the rate of success is low. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
😃
|
||
### Privilege Escalation using DLL Hijacking | ||
|
||
Applications need Dynamic Link Libraries (DLL) to run. | ||
In Windows, most of the application search for DLL in directories, instead of using the full qualified path. | ||
The Attacker replace the DLL to a malicious one. | ||
In Windows, most of the application search for DLL in directories, instead of using the full, qualified path. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Both wrong (mine and yours). The correct would be "fully qualified path". See: https://en.wikipedia.org/wiki/Fully_qualified_name#Path_names
I'm-just-glad-how-both-of-us-are-wrong-at-so-many-places-lol |
No description provided.