#32 Flashcards
(31 cards)
Hackers who hunt for bugs and try to close security holes in software to make systems safer and more resilient. They are often hired by companies and governments to perform security evaluations
White Hats
Malicious hackers with intentions to steal, exploit and sell computer vulnerabilities and data
Black Hats
Some hack for amusement and curiosity while cybercriminals hack most often for what?
Monetary gain
Who use their skills to promote a social or political goal?
Hacktivists
The most common way that hackers get into computer systems is not by hacking its by tricking users to let them in. This is called what? This is where a person is manipulated into divulging confidential information or configuring a computer system so that it permits entry by attackers.
Social Engineering
The most common type of attack.
Phishing
You encounter most often as an email asking you to login to an account on a website. This is an example of what?
Phishing
Where attackers call up a company and then confidential pretend to be from their IT department. This is an example of what?
Pre-texting
Emails ar a sommen delivery mechanism for what?
Trojan horses
What are programs that masquerade as harmless attachments, like a photo or invoice, but actually contain malicious software, called malware ?
Trojan horses
Demand a ransom
Ransomeware
If you have physical access to a computer you can attach wires to the device’s memory chip and make a perfect copy of its contents. With this set up you can try a series of passwords, until the device stats making you wait.
NAND Mirroring
Successfully utilizing a bug to gain capabilities or access
Exploit
Buffer Overflow is an example of what?
Exploit
Buffers are a general term for a block of memory reserved for storing data.
True
What tests the length of input before copying it into a buffer?
Bounds checking
Many modern programming languages implement bounds checking automatically.
True
Named after the small birds, miners used to take underground to warn them of dangerous conditions.
Canaries
Most commonly used to attack websites that use databases is what?
Code injections
- It needs to specify what data we’re retrieving from the database
- it needs to specify from what place in the database to retrieve the value
- It specifies that it only wants data for the account whose username equals a certain value
SQL Query
SQL commands end with a what?
Semicolon
Sanitize input by removing or modifying character before running database queries
True
When a new exploitable bug is discovered that the software creators weren’t aware of?
Zero day vulnerability
Black hat hackers rush to use the exploit for maximum benefit before white hat programmers release a patch for the bug.
True