This type of hacker has malicious intent and does not have permission to access systems.
What is an unauthorized hacker?
This type of attack can be used to send the user to a malicious website
What is DNS spoofing?
This is the term for gaining access to a device via a Bluetooth backdoor
What is bluebugging?
This Windows tool can be used to view security logs
What is Event Viewer?
This type of hacker has permission to access and test systems.
What is an authorized hacker?
This type of attack is when the attacker sends fake packets with a false IP address to deceive the recipient
What is IP spoofing?
This is the term for getting data from a bluetooth device
What is bluesnarfing?
This Windows tool can be used to view network connections
What is Netstat?
This type of hacker might have good intentions, but does not have permission to access systems.
What is a semi-authorized hacker?
This type of attack is when the attacker sends fake ARP packets with a false IP address and MAC address to deceive the recipient
What is ARP spoofing?
This is the term for spamming messages to a bluetooth device
What is bluejacking?
This Windows tool can be used to view running processes
What is Task Manager?
This team is the defensive team in a penetration testing exercise.
What is the blue team?
This type of attack is also known as ARP poisoning
What is ARP spoofing?
This attack involves an access point that is meant to look like another access point to attempt to trick users to connect to that access point
What is an evil twin attack?
This type of assessment uses a report of where a system might be vulnerable
What is vulnerability assessment?
This team is the offensive team in a penetration testing exercise.
What is the red team?
This type of attack makes a system or server unavailable by making it unable to perform tasks or respond to users
What is a DoS attack?
This attack involves a wireless access point that is installed on a secure network without authorization
What is a rogue access point?
This type of assessment tries to exploit vulnerabilities in a system to see if the actor can get into the system
What is penetration testing?
This is how malicious actors maintain access to a system after exploiting vulnerabilities
What is persistence?