Back to notes
Why is it important to disable WPS on WiFi networks?
Press to flip
Disabling WPS helps prevent vulnerabilities that can be exploited by brute force and pixie dust attacks to gain unauthorized access.
Explain the significance of the 'root' vs. 'normal' user distinction in a Linux system.
The 'root' user has full system privileges and can make critical changes, while 'normal' users have limited permissions for security and stability.
What is a deauthentication attack, and why is it used in WiFi hacking?
A deauthentication attack sends unauthorized deauth frames to a client, disconnecting it from the network and capturing handshake files for cracking.
What is the purpose of using the 'site' operator in Google for information gathering?
The 'site' operator helps narrow down search results to a particular domain, making it easier to find specific information within that domain.
What is CUPP, and how is it used in creating custom wordlists?
CUPP (Common User Password Profiler) creates customized wordlists based on information such as names, birthdays, and interests, increasing the effectiveness of brute force attacks.
What is CIDR, and how does it improve subnetting efficiency?
CIDR (Classless Inter-Domain Routing) allows more flexible IP address allocation and efficient use of IP address space by separating the IP address into a network and host portion.
What is the primary objective of a Denial of Service attack?
The primary objective is to overwhelm a website or network with excessive requests, rendering it unavailable to legitimate users.
What role do DNS servers play in internet communication?
DNS servers convert domain names into IP addresses, facilitating the routing of data between clients and servers on the internet.
Describe the difference between TCP and UDP protocols.
TCP (Transmission Control Protocol) is connection-oriented and reliable, ensuring data is delivered in order, while UDP (User Datagram Protocol) is connectionless, faster but less reliable.
How do phishing attacks typically steal credentials?
Phishing attacks use fake web pages to trick users into entering their credentials, which are then captured by the attacker.
What type of attack is it when a hacker hijacks a session without knowing the password?
This is known as a session hijacking attack, where the attacker takes over an active session by impersonating the victim’s session credentials.
What are the main differences between IPv4 and IPv6 addresses?
IPv4 addresses are 32-bit and support approximately 4.3 billion unique addresses, while IPv6 addresses are 128-bit and support an almost infinite number of unique addresses.
Why might a hacker want to change their MAC address?
Changing the MAC address can help maintain anonymity and evade detection or restrictions placed by network administrators.
What are the key components of a URL, and why are they significant?
A URL consists of the protocol, domain name, path, and query. Each part helps locate and access specific resources on the internet.
Which Linux distributions are emphasized for hacking practices in the course?
Kali Linux and Parrot OS are the emphasized Linux distributions.
How does HaveIBeenPwned.com help users enhance their security?
HaveIBeenPwned.com allows users to check if their email addresses have been involved in any data breaches, prompting them to take necessary precautions.
What is the primary purpose of foot printing and reconnaissance in cybersecurity?
The primary purpose is to extract website history and data to understand the target better.
What are honeypots, and how do they enhance cybersecurity?
Honeypots are decoy systems set up to attract and analyze malicious attacks, helping security teams understand and mitigate threats.
How does using a virtual machine benefit a hacker?
Using a virtual machine provides an isolated environment that can be easily reset, ensuring safety for the host system.
Explain the significance of handshake files in WiFi hacking.
Handshake files are generated when a device connects to WiFi and contain crucial data that can be used to crack the network password.
Previous
Next