1.0 Flashcards

1
Q

Backdoor Testing

A

Backdoor testing refers to the process of evaluating a system or software application for the presence of hidden, undocumented, or unauthorized entry points known as “backdoors.” These backdoors can be intentionally or unintentionally created during development and may allow unauthorized access or control over the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive footprinting

A

A technique used in cybersecurity and ethical hacking to gather information about a target system, network, or organization without directly interacting with it. Passive footprinting relies on publicly available information and data sources, Learn as much as you can from open sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OS fingerprinting

A

A method used to identify the operating system running on a device in a network. It can be active, where specific packets are sent and responses analyzed, or passive, where network traffic is observed for OS characteristics. This information is valuable for network management, security assessments, and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SOAR

A

Security Orchestration, Automation, and Response
A system designed to facilitate responses in incident response situations. Automate routine (Signitures), tedious, and time intensive activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nation state

A

Often associated with advanced cyber capabilities and may engage in cyber espionage, cyber warfare, or other cyber activities for political, economic, or military purposes.
Governments
* National security, job security
* Always an external entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DLL injection

A

Dynamic Link Library Injection
An attack that uses the injection of a DLL onto a system, altering the processing of a program by in essence recoding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Resource exhaustion

A

overloads the system’s resources and prevents legitimate users from accessing services on the target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless disassociation

A

Attacks against a wireless system are attacks designed to disassociate a host from the wireless access point and from the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM

A

Security Information and Event Management
Provides a centralized solution for collecting, analyzing, and managing data from multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

False negatives

A

Occurs when an IDS or IPS fails to send an alarm or alert even though an attack is active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credentialed

A

A type of security assessment or vulnerability scan that is conducted with privileged credentials, such as username and password combinations, to access and analyze the internal components of a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-credentialed

A

Also known as external scans or unauthenticated scans, are security assessments or vulnerability scans conducted without using specific credentials to access the internal components of a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS poisoning

A

Domain Name System poisoning
This is a type of attack where a DNS cache is manipulated to redirect domain name resolution to malicious IP addresses. The goal is to misdirect users to fake websites or servers controlled by attackers, leading to potential security breaches or data theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prepending

A

When information is added to the beginning of malicious data. Ex. https://pprofessormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSRF/XSRF

A

Cross-Site Request Forgery
An attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL Stripping

A

Secure Sockets Layer Stripping
An attack where the hacker is able to place themselves between the victim and a secure HTTPS site that the victim uses. “stripping” https:// URLs and turning them into http:// URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP poisoning

A

ARP poisoning, also known as ARP spoofing, is a type of cyber attack where the attacker targets the ARP cache of devices on a local network. In this attack, the attacker sends falsified ARP messages to associate their MAC address with the IP address of another device on the network, such as a router or a victim’s device. This can lead to traffic being redirected through the attacker’s device, allowing them to intercept, modify, or block network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Macros

A

Automated sequences of commands or actions in software applications, often used for repetitive tasks or to automate complex processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Collision

A

When different inputs create the same hash, causing errors or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Watering Hole

A

A cyberattack strategy where attackers target websites frequently visited by a specific group of users, exploiting vulnerabilities in those sites to infect visitors with malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Typosquatting

A

A technique where attackers register domain names similar to popular ones, relying on users’ typographical errors to redirect them to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pretexting

A

A social engineering tactic where attackers create a false pretext or scenario to trick individuals into revealing sensitive information or performing actions they wouldn’t usually do.

23
Q

Session Replay

A

The unauthorized capturing and playback of user sessions (such as keystrokes, mouse clicks, and form entries) on websites or applications, often used for malicious purposes like stealing credentials.

24
Q

Backdoor

A

A hidden or undocumented entry point in software or systems, allowing unauthorized access for maintenance or exploitation by attackers.

25
Q

Rootkit

A

Malicious software designed to gain administrator-level control over a computer system while concealing its presence from detection by antivirus or security software.

26
Q

Script Kiddies

A

Inexperienced or unskilled individuals who use pre-made scripts or tools to launch cyberattacks, often without fully understanding the underlying technology or risks.

27
Q

APT (Advanced Persistent Threat)

A

A sophisticated and persistent cyberattack carried out by skilled and well-funded threat actors, usually targeting specific organizations or individuals over an extended period.

28
Q

Threat Hunting

A

Proactive and continuous process of searching for and identifying potential security threats or anomalies within a network or system, aiming to detect and mitigate them before they cause harm.

29
Q

Cross-site Scripting (XSS)

A

A type of web security vulnerability where attackers inject malicious scripts into web pages viewed by other users, allowing them to steal sensitive data or perform unauthorized actions.

30
Q

Password Spraying

A

A brute-force attack method where attackers attempt to access multiple user accounts by trying a few commonly used passwords against many usernames, reducing the risk of account lockout.

31
Q

XML Injection

A

A type of injection attack where attackers exploit vulnerabilities in XML input handling to manipulate XML data or execute malicious commands, potentially leading to data disclosure or system compromise.

32
Q

Pharming

A

A cyberattack that redirects website traffic to a fake or malicious website, often achieved through DNS spoofing or manipulation to trick users into disclosing sensitive information.

33
Q

Smurfing

A

A type of distributed denial-of-service (DDoS) attack where attackers flood a target network with ICMP echo request (ping) packets, often using IP spoofing to amplify the attack’s impact.

34
Q

Spim

A

Unsolicited and unwanted messages or spam sent through instant messaging (IM) platforms, similar to email spam but targeting IM users.

35
Q

Race Condition

A

A software vulnerability that occurs when the outcome of a program depends on the sequence or timing of multiple concurrent events, leading to unexpected or insecure behavior.

36
Q

NFC

A

Near Field Communication
A short-range wireless technology used for contactless data exchange between devices, commonly found in smartphones for mobile payments, access control, and data transfer.

37
Q

Session Hijacking

A

A cyberattack where an attacker takes control of an active session between a user and a system, often by stealing session tokens or exploiting session management vulnerabilities.

38
Q

Rules of Engagement

A

Guidelines or protocols that define the permitted actions, boundaries, and responsibilities of individuals or teams during cybersecurity operations or engagements.

39
Q

Initialization Vector (IV)

A

A random or predetermined value used as an input in cryptographic algorithms, such as block ciphers, to ensure uniqueness and strengthen encryption against attacks like replay or ciphertext manipulation.

40
Q

Bluesnarfing

A

Unauthorized access to Bluetooth-enabled devices (such as phones or laptops) to steal data, access functions, or control the device’s settings without the owner’s knowledge or consent.

41
Q

Bluejacking

A

Sending unsolicited messages or data to Bluetooth-enabled devices, exploiting their discoverability feature without establishing a connection, often used for harmless pranks or marketing purposes.

42
Q

Credential Stuffing

A

A cyberattack method where attackers use stolen username-password pairs from one website to gain unauthorized access to accounts on other platforms, exploiting users’ reuse of credentials across multiple sites.

43
Q

Whaling

A

A targeted phishing attack that focuses on high-profile or executive-level individuals within organizations, aiming to steal sensitive information, credentials, or financial assets.

44
Q

Reconnaissance

A

The phase of a cyberattack where attackers gather information about a target system, network, or organization, including identifying vulnerabilities, system configurations, and potential entry points.

45
Q

Hybrid Warfare

A

A strategy that combines conventional military tactics with cyberattacks, information warfare, propaganda, and other non-traditional methods to achieve strategic objectives in conflicts.

46
Q

Birthday Attack

A

A cryptographic attack that exploits the probability of collisions in hash functions, allowing attackers to generate two different inputs with the same hash value, potentially compromising integrity or authentication mechanisms.

47
Q

Rainbow Table

A

A precomputed table of hash values for common passwords or inputs, used in password cracking attacks to quickly reverse hash functions and recover plaintext passwords.

48
Q

White-team

A

A group or team responsible for conducting security assessments, penetration testing, and evaluating defensive measures within an organization, often working collaboratively with blue teams and red teams.

49
Q

Purple-team

A

A collaborative approach in cybersecurity where red teams (offensive security) and blue teams (defensive security) work together to simulate attacks, test defenses, share knowledge, and improve overall security posture.

50
Q

MAC Spoofing

A

A technique where attackers forge or impersonate Media Access Control (MAC) addresses of network devices, such as computers or routers, to bypass access controls, gain unauthorized network access, or perform man-in-the-middle attacks.

51
Q

Active Footprinting

A

The process of directly interacting with a target system or network to gather information, such as scanning for open ports, conducting vulnerability assessments, or probing for weaknesses, with the goal of assessing security posture and identifying potential entry points for cyberattacks

52
Q

Lateral Movement

A

The process used by attackers to move deeper into a network to get to the target data.

53
Q

Pivoting

A

Occurs when you exploit one machine and use that as a basis to attack other systems.

54
Q

Attack Vector

A

A method used by attacker