Chapter 6 Crossword CEH

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 3. Concealing malicious files within system locations
  2. 6. Monitoring webcam or video activity
  3. 9. Hidden data attached to files in Windows systems
  4. 10. Software that records user keystrokes
  5. 11. Removing evidence of attacker activity
  6. 12. Gaining administrator or higher level permissions
  7. 15. Identifying threats using known malware patterns
  8. 18. Accessing network resources through a compromised host
  9. 21. Malware designed to hide attacker presence
  10. 24. Stealing authentication information from systems
  11. 26. Turning off system logging mechanisms
  12. 28. Collecting logs from multiple systems for monitoring
  13. 29. Rootkit that exists only in system memory
  14. 30. Modifying logs to hide malicious actions
  15. 32. Recording screenshots of user actions
  16. 34. Techniques used to prevent investigation or detection
  17. 36. Forged authentication ticket granting domain access
  18. 37. Detecting changes by comparing trusted system states
  19. 38. Accessing another users resources with similar privileges
  20. 39. Software that secretly monitors user activity
  21. 40. Detecting attacks through abnormal activity patterns
Down
  1. 1. Monitoring activity from connected USB devices
  2. 2. Forged service authentication ticket attack
  3. 4. Detecting hidden information inside files
  4. 5. Hiding data using spaces or tabs in text
  5. 7. Hiding information within sound files
  6. 8. Sending hidden data through DNS traffic
  7. 13. Recording sound from microphones secretly
  8. 14. Weakness that can be exploited by attackers
  9. 16. Loading a malicious library instead of a legitimate one
  10. 17. Malware that loads during system startup
  11. 19. Control over domain controllers and network resources
  12. 20. Gaining higher access permissions on a system
  13. 22. Using network control messages as covert channels
  14. 23. Maintaining unauthorized access over time
  15. 25. Using a compromised system to reach other systems
  16. 27. Embedding hidden data inside videos
  17. 31. Hiding information within another file or media
  18. 33. Rootkit operating with highest system privileges
  19. 35. Concealing data inside image files