Chapter 6 Crossword CEH
Across
- 3. Concealing malicious files within system locations
- 6. Monitoring webcam or video activity
- 9. Hidden data attached to files in Windows systems
- 10. Software that records user keystrokes
- 11. Removing evidence of attacker activity
- 12. Gaining administrator or higher level permissions
- 15. Identifying threats using known malware patterns
- 18. Accessing network resources through a compromised host
- 21. Malware designed to hide attacker presence
- 24. Stealing authentication information from systems
- 26. Turning off system logging mechanisms
- 28. Collecting logs from multiple systems for monitoring
- 29. Rootkit that exists only in system memory
- 30. Modifying logs to hide malicious actions
- 32. Recording screenshots of user actions
- 34. Techniques used to prevent investigation or detection
- 36. Forged authentication ticket granting domain access
- 37. Detecting changes by comparing trusted system states
- 38. Accessing another users resources with similar privileges
- 39. Software that secretly monitors user activity
- 40. Detecting attacks through abnormal activity patterns
Down
- 1. Monitoring activity from connected USB devices
- 2. Forged service authentication ticket attack
- 4. Detecting hidden information inside files
- 5. Hiding data using spaces or tabs in text
- 7. Hiding information within sound files
- 8. Sending hidden data through DNS traffic
- 13. Recording sound from microphones secretly
- 14. Weakness that can be exploited by attackers
- 16. Loading a malicious library instead of a legitimate one
- 17. Malware that loads during system startup
- 19. Control over domain controllers and network resources
- 20. Gaining higher access permissions on a system
- 22. Using network control messages as covert channels
- 23. Maintaining unauthorized access over time
- 25. Using a compromised system to reach other systems
- 27. Embedding hidden data inside videos
- 31. Hiding information within another file or media
- 33. Rootkit operating with highest system privileges
- 35. Concealing data inside image files