Advanced Threats Flashcards

(32 cards)

1
Q

IV (Initialization Vector)

A

Provides randomization of encryption keys to ensure they are not reused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IV Attack

A

Packet injection to increase the number of packets to analyze and discover the encryption key. (Less keys means higher risk of discovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Banner Grabbing

A

Fingerprinting attack. Telnet Port 80. HTML response might have useful info such as Web Server software brand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spoofing

A

Email Spoofing, MAC Address Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smurf Attack

A

Spoofs source IP address of a directed broadcast ping packet to flood a victim with ping replies.

Countermeasure: Disable Directed Broadcasts. Most routers do this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SYN Flood

A

Disrupts TCP handshake process.

Client sends Syn
Server Sends SYN/ACK
Client never responds with ACK

This leaves connections open. Once connection limit is reached, server is unreachable.

Countermeasure: Flood guards (included in most firewalls and IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XMAS Attack

A

Recon attack. Sets certain bits/flags in packet headers.

Different OS’s respond in different ways. Attackers analyze responses.

Most IDS and IPS can detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay attacks

A

Attacker replays data that was already part of session.

Countermeasure: Timestamp and sequence numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MITM

A

Interception/Eavesdropping

Kerberos helps prevent MITM attacks with mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password attack location

A

Online and Offline Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Birthday attack

A

Attacker create a password that produces the same hash as the users actual password.

Countermeasure: Increase the number of bits in the hash to increase the number of possible hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rainbow table attack

A

Attempts to discover password from hash.

Uses “huge databases of precomputed hashes.”

Countermeasure: Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Poisoning

A

Modifies or Corrupts DNS results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

Corrupts the DNS Server or DNS Client

Client DNS Pharming modifies the hosts file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP Poisoning

A

Misleads computers or switches about the actual MAC address of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two ARP Poisoning attacks

A

ARP MITM, ARP DoS

17
Q

Watering Hole Attack

A

Attempts to discover which web sites employees will likely visit and infects those sites with malware that can infect visitors.

18
Q

Session Hijacking

A

Attacker learns session ID and uses it to impersonate user

19
Q

Flash Cookies and LSO’s (local shared objects)

A

Used for tracking

20
Q

Arbitrary Code Execution

A

Attacker executes commands on a target system

21
Q

Remote Code Execution

A

Attacker executes code from a remote system

22
Q

Header Manipulation

A

Attacker modifies data in a packet such as session ID

23
Q

Race condition

A

Two or more applications attempt to access a resource at the same time.

24
Q

Buffer Overflow

A

Application receives more input that it can handle or different than it expects. Exposes system memory.

25
SQL Injection
Pass queries to back end DB's through web servers
26
or '1' = '1'
SQL Injection phrase to create "true" condition
27
SQL Injection Prevention
Input validation and sending requests to "stored procedures"
28
Cross Site Scripting
Scripts are injected into websites. Scripts contain malicious code.
29
Cross Site Request Forgery (XSRF)
Bad links on good sites. Users perform actions on web sites without their knowledge. Countermeasure: Sign back in before to performing actions. Expire cookies after a short time.
30
Command injection
Inject OS commands into web forms or text boxes. Countermeasure: Input Validation
31
Transitive access
Jumping from a public service to a private one. Ex: Going from public web server to back end DB server. Common example: SQL Injection
32
Fuzzing
Send random data to an application. Random data can crash the program or provide unexpected results.