3.5 Attacks and Exploits Flashcards

Explain common attacks and vulnerabilities against specialized systems.

1
Q

What is patching fragmentation?

A

Patching fragmentation is when device updates are not implemented in a timely manner, leading to individuals using unsupported versions that leave the system vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name a few issues related to mobile devices that can affect the business logic process.

A

-Lack of antimalware protection
-Using known vulnerable components
-Dependency vulnerabilities
-Insecure mobile device storage
-Passcode vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Ettercap?

A

Ettercap is a suite of tools used to launch various types of MITM attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Android SDK tools?

A

Android SDK tools have packages so you can design, build and test mobile apps for Android devices along with reverse engineering an existing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Mobile Security Framework (MobSF)?

A

The MobSF can provide an automated evaluation of code and malware analysis using both static and dynamic analysis. It conducts a thorough assessment to determine parameters such as OS reputation, whether it has been rooted or jail broken and app security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Frida?

A

Frida is an open-source tool that can work with a wide range of OS’s. It includes custom developer tools that can help with application PenTesting, as well as many other features, such as:
-Dumping process memory
-In-process fuzzing
-Anti-jailbreak detection
-Changing a program’s behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Objection?

A

Objection is a runtime exploration toolkit that works on iOS devices. It’s a scriptable debugger that allows you to perform various security related tasks on unencrypted iOS applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can the tools Frida and Objection work together?

A

With Objection, the team can run custom Frida scripts and interact with the filesystems on non-jailbroken iOS devices. It uses Frida to inject objects into an application and then monitors the behavior. It can also simulate jailbroken environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Drozer?

A

Drozer is an open-source attack framework that allows you to find security flaws in the app and devices. It works as a client-server model and lets you assume the role of an Android app so you can observe the behavior of the app as it interacts with other apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is APKX?

A

APKX tool is an Android APK decompiler that allows you to pull and analyze the Java source code to see what’s going on inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is APK Studio?

A

APK Studio is an integrated development environment (IDE) designed so you can decompile or edit an APK file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Postman?

A

Postman provides an interactive and automatic environment used to interact and test an HTTP API. It contains features, such as:
-Explore and create an API
-Build and run a test suite
-Work with other team members
-Analyze results and run reports
-Integrate within the DevOps life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some common IoT vulnerabilities?

A

-Insecure default credentials
-Lack of physical security
-Hard-coded configurations
-Outdated firmware/hardware
-Poorly designed code
-Data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some attacks to Constrained Application Protocol (CoAP)?

A

-Coercive parsing attack - exhausting system resource by sending a Simple Object Access Protocol (SOAP) message with open tags
-Spoofing - possible because UDP does not use a handshake
-Packet Amplification - sending a flood of UDP packets to a DNS server with the source IP set as the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some attacks to Message Queuing Telemetry Transport (MQTT)?

A

-Sniffing - possible because data is not encrypted
-Data modification - obtaining the traffic while data is being transferred between devices during a MITM attack
-Joining a botnet - with Shodan, it’s possible to poison unsecured devices so they become part of a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some common vulnerabilities to storage systems or Industrial control Systems (ICS)?

A

-Default/Blank username and password
-Misconfigured Intelligent Platform Management Interface (IPMI)
-Error messages with too much detail

17
Q

How can you test for software misconfigurations?

A

By fuzzing the system, which sends a running application random and unusual input and monitor how the app responds. A fuzzer can test config files, source code files, logs, archives, document and web files etc.
Another approach is feedback-based fuzzing, which is more interactive and can identify SQL-injection vulnerabilities.

18
Q

What are the 3 types of attack classes on virtual environments?

A

Class 1 - The attack happens outside of the VM
Class 2 - The attack directly affects a VM
Class 3 - The attack originates within the VM and is the attack source

19
Q

What is a VM Escape?

A

A VM Escape is an attack where malware running in a VM is able to interact directly with the hypervisor or host kernel. For this attack to take place, the malicious actor must detect the presence of a virtualized environment. The next step in is for the attacker to compromise the hypervisor.

20
Q

What is Hyperjacking?

A

Hyperjacking is when a malicious actor takes control of the hypervisor that manages a virtual environment. As a result, they will have all the required privileges and can take full control of the environment. In addition they will be able to access every VM along with the data stored on them.

21
Q

What is the Single Quote Method?

A

The single quote method is the simplest and most common way to identify possible SQLi vulnerabilities. It works by submitting a single apostrophe in a web app and then looking for errors.

22
Q

What is Certificate Pinning?

A

Certificate Pinning is the process of assigning a specific certificate to a particular element to avoid MITM-attacks. It usually refers to, for example. assigning a particular certificate public key in order to connect to a website securely and if a different one is provided, it will get rejected without any further checks.