1.0 Attacks, Threats, and Vulnerabilities Flashcards

1
Q

Social engineering with a touch of spoofing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of URL hijacking where attackers register intentionally misspelled domain names similar to popular domain names

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lying to get information. Adding a disclaimer or information text to the emails received from external domains

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social engineering attack that targets individuals in an organization

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social engineering attack that targets high-profiled individuals in an organization

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redirect a legit website to a bogus site

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Voice phishing

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SMS phishing

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gather information about the victim before phishing

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacker pretends to be someone they are not

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A threat that does not actually exist

A

Computer hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infect third-party site that is visited

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Having a layered defense

A

Defense-in-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unsolicited messages

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spam over Instant Messaging

A

SPIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intentionally slow down the server conversation

A

Tarpitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attacker collects login credentials

A

Credential Harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are these a principle of?
1. Authority
2. Intimidation
3. Consensus/Social Proof
4. Scarcity
5. Urgency
6. Familiarity/Liking
7. Trust

A

Social Engineering Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware that can reproduce itself but needs you to execute a program

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virus that is part of the application

A

Program Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Virus that infects the boot sector

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Virus that is OS and browser-based

A

Script Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Virus that is common in Microsoft Office

A

Macros Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Virus that operates in memory inside RAM but is never installed in a file or application
Fileless Virus
26
Malware that self-replicates
Worm
27
Personal Identifiable Information
PII
28
Attacker wants your money
Ransomware
29
Malware encrypts your data files
Crypto-malware
30
Software that pretends to be something else
Trojan Horse
31
Undesirable software
PUP (Potentially Unwanted Program)
32
Malware that has a backdoor
RAT (Remote Access Trojan)
33
Modifies core system files and is part of the kernel which is invisible to the OS
Rootkits
34
Software that displays online advertisement to users
Adware
35
Malicious software that secretly collects and sends information about a person or organization to a third party
Spyware
36
Group of bots (malware-infected computers) working together and controlled by a single attacking party
Botnets
37
Malicious attack that makes online service, network resource, or host machine unavailable
DDoS (Distributed Denial of Service)
38
Malicious piece of code that is secretly inserted into a computer network, operating system, or software application and lies dormant until a specific condition occurs
Logic Bomb
39
Tries common passwords on multiple accounts a few times so that there are no lockouts, no alarms, and no alerts
Spraying Attack
40
Try every possible password until the hash is matched
Brute Force
41
Use dictionary to find common words and can substitute letters for numbers
Dictionary Attack
42
Optimzed, pre-built set of hashes
Rainbow Tables
43
Extra random data
Salt
44
Doesn't need extra rights or permissions. Like a keyboard or a mouse
HID (Human Interface Device)
45
Stealing credit card info usually during a normal transaction
Skimming
46
Compuers that identify patterns in data and improve their predictions with training data
Machine Learning
47
Hash collision attack
Birthday Attack
48
form of hashing that had many hash collisions
MD5 (Message Digest Algorithm 5)
49
gain higher-level access to a system
TLS (Transport Layer Security)
50
encrypted link between web server and web browser
SSL (Secure Sockets Layer)
51
Gain higher level access
Privilege Escalation
52
Only data in executable areas can run
Data Execution Prevention
53
Takes advantage of trust a user has for a site
XSS (Cross-site Scripting)
54
web site allows scripts to run in user input
Non-persistent (reflected) XSS Attack
55
attacker posts a message to a social network, no specific target
Persistent (stored) XSS Attack
56
modifying SQL (Structured Query Language) requests
SQL Injection
57
Adding your own information to a data stream
Code Injection
58
Modifying XML (Extensible Markup Language) requests
XML Injection
59
Dynamic-Link library have an application run a program
DLL Injection (Dynamic-Link Library)
60
Overwriting a buffer of memory
Buffer Overflows
61
Attacker uses information gathered over network to to either delay or repeat it
Replay Attack
62
Technique where attacker captures hash of a user and sends his own authentication request with captured credentials to access the same network
Pass the Hash Attack
63
Code injection technique used to exploit web applications which could reveal sensitive user information or modify information, manipulates application results
LDAP Injection (Lightweight Directory Access Protocol)
64
a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
cookies
65
Attacker intercepts the session ID and uses it to access the server with the victim's credentials, doesn't require username/password
Sidejacking (Session hijacking)
66
An attack that attempts to have users unknowingly execute actions on a web application for which they are currently authenticated. One-click attack, session riding that takes advantage of trust that a web application has for an authenticated user 1. Cookie-based session handling. 2. No unpredictable request parameters 3. The user clicks the malicious URL. 4. The user must be logged in to the vulnerable web application.
XSRF, CSRF (Cross-site request forgery)
67
Attacker finds vulnerable web applications and sends requests to a web server which performs the request on behalf of the attacker 1. Attacker sends a request that controls a web application 2. Web server sends request to another service (ex cloud file storage) 3. Cloud storage sends response to web server 4. Web server forwards response to attacker
SSRF (Server-side request forgery)
68
Filling in the spaces between two objects, a middleman, Windows has its own shim to backwards compatibility with previous windows versions
Shimming
69
metamorphic malware. A different program each time it's downloaded. difficult to match with signature-based detection
refactoring
70
SSL Stripping/HTTP downgrade
71
Time of check time of use
TOCTOU
72
memory leak
73
NULL Pointer dereference
74
Integer Overflow
75
Directory Traversal
76
API Attacks
77
Resource Exhaustion
78
ZIP bomb
79
DHCP Starvation
80
Rogue Access Points
81
Wireless Evil Twins
82
Bluejacking
83
Bluesnarfing
84
Wireless Disassociation
85
RFID Atacks
86
nonce
87
NFC
88
Initiazlization Vectors
89
On-path Network attack
90
ARP Poisioning
91
On-path browser attack
92
STP
93
MAC Flooding
94
MAC Cloning
95
DNS Poisoning
96
Domain Hijacking
97
DDOS
98
DDOS Amplification
99
Applicaiton DOS
100
OT DOS
101
Powershell
102
Python
103
Shell Script
104
Macros
105
VBA
106
Threat actors
107
APT
108
Nation states
109
Hacktivist
110
Script Kiddies
111
Organizes Crime
112
Shadow IT
113
Attack vectors
114
OSINT
115
CVE
116
NVD
117
IOC
118
RFC
119
TTP
120
Zero-day attacks
121
Unsecured root accounts
122
Common Vulnerability Scoring system
CVSS
123
logging of security events and information
Security Information and Event Management (SIEM)
124
standard for message logging
Syslog
125
simulate an attack
Pentest
126
document that defines the purpose and scope of a pentest
Rules of engagement
127
gather information before an atack
Reconaissance
128
Reconnaissance through open source
Passive footprinting
129
combine wifi monitoring and a gps
Wardriving/Warflying
130
gathering info from many open sources
Open source Intelligence (OSINT)
131
Offensive security team, ethical hacking, exploiting vulnerabilities, social engineering, web app scanning
Red Team
132
defensive security team, protecting the data, daily security tasks, incidence response, threat hunting, digital forensics
Blue Team
133
red and blue teams working together
Purple team
134
Manages interactions between red team and blue team
White team