Skip to content

Conversation

@ShubhamPalriwala
Copy link
Contributor

No description provided.

Copy link
Owner

@g0rbe g0rbe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Read the comments and correct it.
Thanks, my grammar was (or still?) awful.


A password cracking application is used along with with a dictionary file.
This dictionary file contains entire dictionary or a list of known and common words.
A password-cracking application is used along with a dictionary file.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pasword cracking is without dash. See: https://en.wikipedia.org/wiki/Password_cracking

Domain controller responds to a challenge known as **nonce** to be encrypted by the password's hash.
This challenge is a 16 byte random number generated ny the domain controller.
By comparing the challenge with the database, domain controller permit or deny the login.
This challenge is a 16-byte random number generated by the domain controller.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are love dashes 😃


Rootkit is a software designed to provide privileged access to a remote user over a system, creates a backdoor.
Deployed after attacker gain high-level access to a system.
A rootkit is software designed to provide privileged access to a remote user over a system, creates a backdoor.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"A rootkit is a software ..." maybe.

#### Types

- **Application level rootkit**: perform manipulation of standard application file with an injection of codes.
- **Application-level rootkit**: perform manipulation of standard application file with an injection of codes.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


- **Application level rootkit**: perform manipulation of standard application file with an injection of codes.
- **Application-level rootkit**: perform manipulation of standard application file with an injection of codes.
- **Kernel-level rootkit**: inject malicious code to the kernel
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mine is wrong too. It should be "Kernel level rootkit".

Comparing a password using a rainbow table.
Rainbow Table is the pregenerated hashes of the words in a dictionary or the combination of characters.
The advantage of Rainbow Table is the speed, because it takes less time to compare the hashes.
Rainbow Table is the pre-generated hashes of the words in a dictionary or the combination of characters.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pregenerate is without dash. See: https://en.wiktionary.org/wiki/pregenerate


The attacker uses the information extracted by initial phases and guess the password.
Not common method and the rate of failure is high.
Not a common method and the rate of success is low.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

😃

Applications need Dynamic Link Libraries (DLL) to run.
In Windows, most of the application search for DLL in directories, instead of using the full qualified path.
The Attacker replace the DLL to a malicious one.
In Windows, most of the application search for DLL in directories, instead of using the full, qualified path.
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Both wrong (mine and yours). The correct would be "fully qualified path". See: https://en.wikipedia.org/wiki/Fully_qualified_name#Path_names

@ShubhamPalriwala
Copy link
Contributor Author

I'm-just-glad-how-both-of-us-are-wrong-at-so-many-places-lol

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants