2.4 Flashcards

An overview of malware, viruses and worms, spyware and bloatware, other malware types, physical attacks, denial of service, DNS attacks, wireless attacks, on-path attacks, replay attacks, malicious code, application attacks, cryptographic attacks, password attacks, indicators of compromise

1
Q

Software doing bad things to your system

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A download that happens automatically without the user clicking on or opening anything

A

Drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of malware that encrypts or exfiltrates your computer’s data, and then asks for a sum of money to return or not expose the data

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If you log into your computer and find that your files are encrypted, what type of malware is your computer infected with? Besides the encryption, your computer works normally.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/False

Keep your backups online so that you can quickly restore them.

A

False

Keep your backups offline so that attackers can’t access them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 ways to protect against ransomware

A

Have an offline backup
Keep your OS updated
Keep your applications patched
Keep your antimalware signatures up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of malware that replicates itself via user intervention (ex. clicking a link, running an executable)

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of virus that runs as part of an application

A

Program virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of virus that automatically runs as the system boots

A

Boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of virus that runs as part of a script on a browser

A

Script virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of virus commonly found in Microsoft Office files as part of a small application embedded within the file

A

Macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of virus that never writes any software or malicious code to your storage drives. It operates in memory, but is never installed in a file or application.

A

Fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of malware that self-replicates without human intervention. This malware can attack at any time and move freely within your network once it gets in.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 main technologies that stop worm infections?

A

Firewalls and IPS/IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of malware that monitors your browsing, takes screen captures, and may log your keystrokes. This data is sometimes used for advertising, identity theft, or affiliate fraud.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 ways to protect against spyware

A

Maintain your antimalware signatures
Research what you’re installing
Keep a backup!
Run antimalware scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of malware that might be benign other than the fact it takes up storage and memory, and reduces performance. It’s something that you don’t need and don’t expect, often forcibly bundled with other apps.

This malware can open your system to exploits, even if it doesn’t damage your device on its own.

A

Bloatware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3 ways to remove bloatware

A

Manually remove it
Use the built-in uninstaller
Third-party uninstallers and cleaners (always have a backup!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A type of spyware that logs your keystrokes and sends them to the attacker

Often includes clipboard logging, screen logging, instant messaging, and search engine queries

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of malware that performs an action after a predefined event has happened (ex. date and time or user event)

This malware is usually left by someone with a grudge. Because they are created by a person, they are very difficult to identify with malware signatures. There are NO KNOWN SIGNATURES.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

3 ways to prevent a logic bomb

A

Processes and procedures to protect configurations from being changed (formal change control)

Electronic monitoring (alert on changes, HIDS)

Constant auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A type of malware that modifies the core system files in a way that is invisible to the OS. Essentially, to becomes a part of the kernel/OS of the machine. Because of this, it’s invisible to antivirus.

It has full run of your computer.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 ways to find and remove rootkits

A

Look for unusual symptoms (identify with antimalware software)

Use a remover specific to the type of rootkit

Secure boot with UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can a secure boot help identify and remove a rootkit?

A

The secure boot will search for a OS signature, and verify that the kernel of the OS hasn’t changed before the system is booted. Even if the rootkit has been installed, the secure boot will stop the rootkit from running once the computer boots up for real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A type of physical attack where the attacker gains physical access to the device that they want to break into. They do this by forcing doors open or breaking windows.
Brute force
26
A type of physical attack where attackers make copies of access badges or key fobs of authorized personnel. They can read one card/fob and then immediately copy it to another in a matter of seconds, without the authorized individual knowing.
RFID cloning
27
How is RFID cloning mitigated?
MFA The attacker might have the badge, but they likely don't have other information
28
A type of physical attack where the attacker attacks everything supporting the technology. Cutting off power, interfering with HVAC (Heating, Ventilation, AC) or humidity controls, taking down fire suppression, etc.
Environmental attack
29
A type of attack where the attacker causes a service or device to fail, preventing authorized users from accessing it
DoS
30
A DoS attack where the cause is unintentional, often performed by legitimate individuals. This can happen through a programming error, accidentally downloading something too large/complex for a device to handle, or by a piece of equipment breaking (ex. a water line breaking in the IT dept)
"Friendly" DoS
31
A type of attack where the attacker causes a service or device to fail by enlisting a large number of computers to take up the resources of that device.
DDoS
32
A type of threat where the attacker has comparatively fewer resources than the victim
Asymmetric threat
33
What kind of attack is often called an asymmetric threat?
DDoS The attacker by themself often has fewer resources than the network they attempt to bring down. But with the help of a botnet, they can be successful.
34
A method of carrying out a DDoS attack in which the attacker sends a query to a server, and spoofs their IP address so the response of that query will be sent to the victim. Both the query and response are relatively the same size and are of the same protocol.
DDoS reflection
35
A method of carrying out a DDoS attack in which the attacker sends a query to a server, and spoofs their IP address so the response of that query will be sent to the victim. The response is much larger than the original query, meaning that the attacker doesn't have to expend many resources in exchange for a large attack.
DDoS amplification
36
Which 3 protocols can be abused to perform DDoS amplification?
NTP, DNS, ICMP
37
3 methods to perform DNS poisoning
Modify the DNS server Modify the device's host files (they take precedent over DNS queries) Via MITM, intercept the legitimate DNS server response, and instead send one of your own (real-time redirection)
38
A type of attack where the attacker causes the victim to resolve a valid domain name into a malicious IP address or vice versa
DNS poisoning
39
A type of attack where the attacker gets access to the domain registration of a legitimate website That way, the attacker has control over where the traffic flows
Domain hijacking
40
3 ways an attacker can get into the account used for the domain registration for a website
Brute force Social engineer the password Gain access to the email address that manages the account
41
A type of attack where the victim is redirected to an advertising site, a competitor site, a phishing site, or a site that performs drive-by downloads when attempting to access a legitimate website.
URL hijacking AKA typosquatting AKA brandjacking
42
2 other names for URL hijacking
Typosquatting Brandjacking
43
A type of wireless attack where the attacker disconnects the victim from their network connection. A type of DoS attack.
Wireless deauthentication attack
44
What type of frames does the wireless deauthentication attack take advantage of?
802.11 management frames
45
Frames used for the management of network connections. They are sent/received by the AP, and are used to connect to the network, manage the connection, and then disconnect from the network. They are also used to associate to and dissociate from an AP.
802.11 management frames
46
RF stands for
Radio frequency
47
A type of wireless attack where the attacker transmits interfering wireless signals (noise) until the victim cannot discern the legitimate traffic from the noise. It prevents any nearby victims from being able to receive signals from the AP.
RF jamming AKA wireless jamming
48
Which IEEE update addressed the problem enabling wireless deauthentication attacks by encrypting management frames?
802.11ac
49
What equipment can inadvertently cause RF jamming?
Microwave Fluorescent lights
50
RF jamming is AKA
Wireless jamming
51
3 different ways to carry out wireless/RF jamming
Constant, random bits/frames Random intervals of noise Reactive jamming - only happens when someone else tries to communicate
52
True/False Wireless/RF jamming can be carried out across the globe
False Wireless/RF jamming needs to be performed close-by
53
The method of finding the source of RF jamming
Fox hunting
54
What 2 types of tools are useful during fox hunting?
Directional antenna - locates the direction of the signal Attenuator - lowers the signal strength to make it easier to tell where it's coming from (it gets louder as you get closer)
55
A type of attack where the attacker sits between two devices and watches all the traffic occurring between them
On-path attack AKA MITM attack
56
MITM stands for
Man-in-the-middle
57
A type of on-path attack where the attacker gets on the same subnet as the victim devices. The attacker then spoofs their IP address to one of a trusted device, and then advertises their IP/MAC pair to legitimate devices. That way, the legitimate devices will then send their traffic to the malicious device instead of the legitimate device.
ARP poisoning
58
What enables ARP poisoning?
No security in ARP
59
A type of on-path attack in which the attacker resides between the device and the network, acting as a proxy. In fact, the attacker resides in the same system as the victim. Even if the network traffic is encrypted, because the attacker is on the same system, they would be able to see the data Once the victim logs into their bank account, the attacker can get those credentials for later use. They can then start other sessions behind the scenes that the victim will not see. Online shopping, money transfers, etc.
On-path browser attack AKA man-in-the-browser attack
60
A type of attack where the attacker reuses legitimate information in order to authenticate to a service
Replay attack
61
Why do attackers want your cookies?
Cookies contain session IDs; the attacker could gain access to a server without any authentication credentials by using the session ID
61
2 ways to avoid replay attacks
Encrypt the authentication credentials Use a salt that changes for every session
62
A type of attack where the attacker gains access to a session ID, and then uses it in order to authenticate to the server
Session hijacking AKA sidejacking
63
2 ways to prevent session hijacking
End-to-end encryption (HTTPS) End-to-somewhere encryption (VPN concentrator; if you can't encrypt the whole journey, you can at least encrypt part of it. It's best to avoid cleartext over a local network)
64
Session hijacking is AKA
Sidejacking
65
An attack where the attacker inserts their own information into a data stream
Code injection
66
What enables code injection?
Bad programming
67
A really useful buffer overflow is ____
Repeatable Buffer overflows can often be unpredictable. If the attacker can find a way to consistently get their desired outcome, it is very a very useful exploit.
68
In order to perform a replay attack, the attacker needs what kind of data?
Raw network data (through a network tap, ARP poisoning)
69
True/False A replay attack is an on-path attack
False While the attacker may gather the data to perform the replay attack through an on-path attack, the actual replay attack is not on-path
70
An application attack where an attacker gains elevated permissions on a system
Privilege escalation
71
4 ways to mitigate privilege escalation
Keep applications patched Update anti-malware signatures Data Execution Prevention Use address space layout randomization (This changes the location in memory that an application runs each time it's launched; prevents buffer overflow attacks)
72
What is it called when a legitimate website uses the user's browser to make legitimate requests for other web pages to display content on the original website? For example, when you go on one page, a video from YouTube and pictures from Instagram are also present.
Cross-site requests
73
CSRF takes advantage of what?
CSRF takes advantage of the trust that a web application has for the user The web site trusts your browser Requests are made without your consent or your knowledge Attacker posts a Facebook status on your account
74
An attack that takes advantage of the trust that a web application has for the user
CSRF / XSRF
75
What anti-forgery solution has been implemented to prevent CSRF?
Cryptographic token It verifies that the user has authenticated properly, and that the token is the correct one for that specific session
76
An attack that allows an attacker to read files on a website that are outside of the website's file directory
Directory traversal
77
What enables directory traversal attacks?
Web server misconfiguration OR Web application software vulnerability
78
A cryptographic attack that takes advantage of the chances of a hash collision occurring. They check for this collision by brute force. This method is much more efficient than brute force attacks, though it is a type of brute force. 1) The attacker gains a list of password hashes 2) Using a cryptographic algorithm, they generate hashes of would-be passwords until they find a collision. This process happens offline. 3) They then attempt to input the credentials
Birthday attack
79
What mitigates a birthday attack?
Large hash output sizes The larger the hash, the more difficult it will be for the attacker to duplicate it
80
Which cryptographic algorithm has a problem with hash collisions?
MD5
81
A cryptographic attack where the attacker forces a system to revert its security to an older (less secure) model Usually affects the encryption algorithm
Downgrade attack
82
SSL stripping is a form of what 2 kinds of attack?
On-path attack and downgrade attack The attacker sits in the middle of the conversation and strips the S from HTTPS by rewriting URLs
83
A password attack in which the attacker attempts to use the top most common passwords on every account they can get their hands on. NOTE They stop short of raising any alarms or account lockouts.
Spraying attack
84
A password attack in which the attacker tries every password combination until the hash is matched.
Brute force attack
85
True/False A strong hashing algorithm can slow down a brute force attack
True
86
Online brute force attacks involve
Passwords
87
Offline brute force attacks involve
Hashes They take the stored hash offline and attempt all passwords until it matches the hash This sidesteps account lockout procedures
88
IOC stands for
Indicators of Compromise
89
An event that happens at an unusual time, documented by a log, is called:
Out-of-cycle logging
90
True/False Out-of-cycle logging typically reflects a configuration error
False Out-of-cycle logging can be an IOC
91
True/False Since logs record everything, you don't have to worry that attackers can hide from them
False Attackers can delete logs from the system