1.2 Given a scenario, analyze potential indicators to determine the type of attack Flashcards

1
Q

What is Malware?

A

Malicious Software with the intent to gain control, do damage, or extract financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ransomware?

A

Any form of malware that makes you pay to get the malware to go away, it is called ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are trojans?

A

It’s less of a type of malware and more of a method in which the malware spreads or plants itself. It’s a piece of software that is useful to the victim. It’s goals are usually to collect personal information from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are worms?

A

The malware infects memory areas with buffer overflows and propagating themselves by attempting to contact random IP addresses. They are easy to detect, but their code execution proved to be a problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Potentially unwanted Programs (PuPs)?

A

These are technically not malware, but can be undesirable. This is a blanket term for adware, bloatware, crapware, etc. These are different from malware in that the user consents to them being downloaded. These are usually coupled with legitimate programs as add-ons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a fileless virus?

A

A fileless virus is a vicious malware that behaves similar to a regular virus that attacks and propagates, but only lives in memory. It often uses tools built into windows like PowerShell to attack that very system. Anti-malware struggles to ID this malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Command and Control (CnC)?

A

These are servers that control the actions of the bots. CnCs try to automate the control, not requiring human interaction after the initial programming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are bots/botnets?

A

Botnets are a distributed type of malware that uses remotely controlled malware that has infected several different computers. The idea is to create a large robot-like network used to wage large-scale attacks on systems and networks. Bots are used to carry on the orders of the attacker once the attack begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Cryptomalware?

A

This malware uses some form of encryption to lock a user out of a system. Once a system is encrypted, usually the victim will have to pay to get their data unencrypted again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Logic Bombs?

A

It is usually a script that is set to execute either at a specific time or when certain events or circumstances have taken place on the system. Detecting them is hard because it involves auditing a system and analyzing the files. Usually placed by disgruntled employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Spyware?

A

It isn’t a type of malware; it is more of a goal instead. Spyware is a virus or trojan in form ,but we tend to classify it more by its function rather than type. It is used for observing user actions, as well as stealing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Keyloggers?

A

A keylogger is a piece of malware that records keystrokes. Most will store a certain amount of keystrokes before sending it off in a file to a bad actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Remote Access Trojan (RAT)?

A

A remote administration tool maliciously installed as a trojan horse to give a remote user some level of control of the infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a rootkit?

A

A piece of malware that attempts to infect critical operating system files on the host. These are hard to detect from antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a backdoor?

A

An entry method into a piece of software that wasn’t intended to be used by normal users. Bad actors can use these to consistently get into a system for malicious reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Password attack?

A

An attempt to extract a plaintext key or password from ciphertext or hashes to gain entry to unauthorized data.

17
Q

What is a Password Spraying Attack?

A

An attacker applies a few common passwords to many accounts in an organization. This tends to work with single sign-on systems better than others.

18
Q

What is a Dictionary Attack?

A

A program that will read contents from a file that uses common words in a dictionary to attempt to crack a password.

19
Q

What is a Brute Force attack?

A

Attempts to derive a password or key by inspecting either ciphertext or a hash and then trying every possible combination of key or hash until it can decrypt the plaintext or generate a match.

20
Q

What is an offline Brute force attack?

A

In an offline brute force, an attacker has access to the encrypted material or a password hash and tries different keys without the risk of discovery.

21
Q

What is an online brute force attack?

A

In an online attack, an attacker needs to interact with a target system.

22
Q

What is a Rainbow Table?

A

These are binary files, not text files.. These store the hashes of passwords so that, if a match were to occur, it would crack a password.

23
Q

What is a plaintext/Unencrpyted attack?

A

Attackers use packet sniffing software to monitor and capture traffic on a network. If a password is sent in plaintext or unencrypted, then the attacker has the password. It is referred to a generic packet sniffing attack.

24
Q

What is a physical attack on a system?

A

An attacker can connect many tools that may gather all kinds of information about a system.

25
Q

What is a malicious USB cable?

A

USBS can be used to send preconfigured commands or deliver a payload. It also doubles as a regular cable but it also steals information. The way to fix is to disable any USB ports

26
Q

What is a malicious flash drive?

A

It is a removable device that can deliver payloads, steal information, or execute preconfigured commands. To fix this problem, disable USB ports.

27
Q

What is Card cloning?

A

The information on any magnetic stripe on a plastic card can be cloned and then placed on another card.

28
Q

What is Skimming?

A

These are devices placed on top of card readers of machines like ATMS, vending machines, gas pumps, etc. They read the information on the magnetic stripes.

29
Q

What is Adversarial Artificial Intelligence?

A

AI that can insert tainted training data for machine learning, thus disrupting the defense. This is the process of deliberately deceiving to penetrate AI defenses.

30
Q

What is Tainted Training data for machine learning?

A

Attackers could deliberately salt misleading or fuzz to mess with the defender’s AI.

31
Q

What is security of machine learning algorithms?

A

This helps to guard against the discovery of algorithms AI defense systems to stop attackers from penetrating these AI systems.

32
Q

What are supply-chain attacks?

A

When an attacker infects a product that is then bought by the victim and this product then infects the system it is connected to.

33
Q

Define cloud-based vs. on-premises attacks.

A

Just know that the physical component of on-premises vulnerabilities and attacks don’t apply to cloud-based, but the network-specific vulnerabilities and attacks apply to both still.

34
Q

What are Cryptographic Attacks?

A

Every attack starts by careful inspection of the cryptosystem and aggressively probing and experimenting to find some form of weakness. Many cryptographic attacks target cracking passwords.

35
Q

What is a birthday attack?

A

It is a statistic that it’ll take roughly half the hashes to find a collision/match using a brute force attack.

36
Q

What is a collision attack?

A

It’s when two different values produce the same hash, thus a collision has occurred. Attackers try to take advantage because they don’t need to know the private key, just a value that produces an identical signature.

37
Q

What is a downgrade attack?

A

The attack makes a legitimate request to the web server to use a weak, deprecated algorithm in hopes of then successfully getting keys, passwords, and so forth.