4.4 Flashcards

1
Q

Whats DoS?

A

(Denial of service) It forces a service to fail and cause a system to be unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whats DDoS?

A

(Distributed Denial of Service) It’s a launch of an army of computers to bring down a service(use all bandwidth or resources and it’s the reason bad guys use botnets.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whats DDoS amplification?

A

Turning a small attack into a big attack and uses protocols with little authentication or checks(like NTP, DNS, ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are social engineering principles?

A
  1. Authority(social engineer is in charge)
  2. Intimidation(there will be bad things if you dont help)
  3. Consensus/Social proof(Convince based on whats normally expected.
  4. Scarcity(the situation will not be this way for long)
  5. Urgency(act quick, don’t think)
  6. Familiarity/liking(we have common friends)
  7. Trust(someone who is safe like from IT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats Insider threats?

A

IT happens when we give people tons of access they shouldn’t have. But sometimes it could be phishing scams or hacking scams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are logic bombs?

A

A logic bomb is a very specific kind of malware that’s waiting for an event to occur(usually time, user event) and difficult to identify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whats rouge access point

A

It’s a significant potential backdoor(huge security concerns) and they are very easy to plug in a wireless AP, or enable wireless sharing in your OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are wireless evil twins?

A

By using a wireless access point, the bad guys can configure it exactly the same way as an existing network(same SSID and security settings) WiFi hotspots are easy to feel(wifi in a hotel) and can be countered if you encrypt your communication by using HTTPS and a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whats Wadriving?

A

Gathering information about your network(huge amount of intel in a short period of time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats Phishing?

A

Phishing is a technique used by the bad guys to try to convince you to give up some personal information.(like username and password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whats Vishing?

A

It’s phishing thats done over the phone(fake security check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whats spear phishing?

A

it’s a way to really focus in on a narrow group of people and try to construct a front-end and a message that seems very legitimate to the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats ransomware?

A

It’s one where the bad guys want your money, and the best way to get the money from you is to take the data away from you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whats crypto-malware?

A

This is ransomware that encrypts all of the data on your computer and holds that data for ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how can we protect against ransomware?

A
  1. Always having a backup
  2. Keep your system up-to-date
  3. Keep your applications up-to-date
  4. Keep your anti-virus/anti-malware signatures up-to-date.
  5. Keep everything up-to-date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats DNS poisoning?

A

is a type of attack that exploits vulnerabilities in the DNS to divert Internet traffic away from legitimate servers and towards fake ones.

17
Q

Whats spoofing?

A

It is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones(Fake web server, fake dns)

18
Q

What are some examples of spoofing?

A
  1. Email address(sending email address of an email isn’t really the sender)
  2. Caller ID(the incoming call info is completely fake)
  3. Man-in-the-middle attacks(Person in the middle of the conversation pretends to be both endpoints)
19
Q

Whats deauthentication?

A

It’s a significant wireless DoS attack.

20
Q

Whats brute force attack?

A

A brute force attack is an attempt to crack a password or username or find the key used to encrypt a message, using a trial and error approach and hoping, eventually, to guess correctly.

21
Q

What are the disadvantages of brute force attacks?

A
  1. Very slow
  2. Most accounts will lockout
  3. Keep trying the login process.
22
Q

What are the two primary methods of VLAN hopping?

A
  1. Switch spoofing

2. Double tagging

23
Q

Whats switch spoofing?

A

Switch spoofing is a type of VLAN hopping attack that works by taking advantage of an incorrectly configured trunk port(By default, trunk ports have access to all VLANs and pass traffic for multiple VLANs across the same physical link, generally between switches.)

24
Q

Whats double tagging?

A

An attacker connected to an 802.1Q-enabled port prepends two VLAN tags to a frame that it transmits. The frame (externally tagged with VLAN ID that the attacker’s port is really a member of) is forwarded without the first tag because it is the native VLAN of a trunk interface.

25
Q

Whats man-in-the-middle?

A

It’s an attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems. A MITM attack exploits the real-time processing of transactions, conversations or transfer of other data.

26
Q

Why does ARP poisoning(spoofing) happen?

A

Because ARP has no security.

27
Q

Whats man-in-the-browser?

A

It’s when the calls are coming from the inside browser(malware/Trojan does all the proxy work). Man-in-the-browser waits for us to login to our account and then takes all the data but the everything looks normal to the victim.

28
Q

Whats vulnerability?

A

It’s a weakness in a system which allows bad guys to gain access.

29
Q

What methods of vulnerability are there?

A
  1. Data injection
  2. Broken authentication process
  3. Sensitive data exposure
  4. Security misconfiguration
30
Q

Whats exploit?

A

Taking advantage of a vulnerability(gain control, modify data, disable a service)