When a hacker uses emails, fake links, or attachments to gain access.
Phishing
Information gathering, social engineering, locate network range, which phase is it?
Reconnaissance
Malware that has the primary function to duplicate itself and spread to uninfected computers while staying active on infected systems.
Worm
A malicious software that enters a user’s computer to gather data to send it to a third party without the user's consent.
Spyware
When an ethical hacker tries to maintain future access by installing backdoors in the target system using Metasploit tool. Which phase is this?
Maintaining Access Phase
Malware that is designed to encrypt files on a device making any files and systems that rely on them unusable so a ransom will be paid in exchange for the malicious actor to decrypt the files.
Ransomware
The hacker tries to guess the password by using different combinations of letters, numbers and signs, by using one or more computers to do the work.
Password Cracking - Brute Force
When an ethical hacker erases any clues that shows a hacker has been in the exploited system.
Covering Tracks Phase
A network of hijacked computers that have been infected with bot malware and controlled remotely by a hacker
Bot/Botnet
Hackers use a program to record the pattern and order of keys typed on the user's device.
Keylogging
This is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
Penetration Testing
A fake program downloaded on a computer which compromises the computer system, replicates itself and locks the user out of files and other information.
Virus
sa' or '1'='1
SQL INJECTION
Human-based & Computer-based ____________ : the art of manipulating people to get confidential information.
Social Engineering
A malware program that includes a back door for administrative control over the targets’ computer, and often used in social engineering.
Trojan