Attack Types Flashcards

1
Q

IOC - Define

A

Indicator of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malicious Code that requires user interaction to install and replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crypto-malware/Ransomware

A

Malicious applications that scare or scam users into paying money or granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan/RAT

A

Friendly software that contains malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worms

A

Self replicating program without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Service Worms

A

Worm that exploits a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mass Mailing Worms

A

Work that spreads thorugh email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PUP

A

Potentially Unwanted Program which tend to be adware or spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless Virus

A

Malware that operates in memory. Hooks in through Powershell or WMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnet

A

Malicious Code that infects a large number of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

Malicious code that triggers after a specific time or on a date or after a specific activity etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Empire, PowerSploit, MetaSploit, Cobalt Strike

A

Fileless Attack Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Malicious software that collects user activity and reports back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger

A

Malicious code that collects all keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkits

A

Malicious code that installs at the OS or Kernal level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backdoors

A

Software that installs for the purpose of opening ports to install additional software

17
Q

Spraying

A

A form of brute force where the attacker has acquired a bunch of usernames and are testing passwords against them.

18
Q

Brute Force

A

Systematic approach of trying different passwords

19
Q

Rainbow Table

A

Precomputed table to reverse cryptographic hashes

20
Q

Dictionary Attack

A

Using known words to brute force

21
Q

Brutus, Cain and Abel, Crack, Aircrack-ng, John the Ripper

A

Dictionary attack tools

22
Q

Salting

A

Adding random data to hashing algorithm so that each hash is unique even if the same password is used twice.

23
Q

Known Plaintext/ Ciphertext

A

Access to both can allow an attacker to reveal further information like secret keys. AES is not vulnerable to this attack.

24
Q

AES

A

Advanced Standard Encryption

25
Birthday Attack
Brute force that works on hash collisions
26
Hash Collisions
When two different passwords accidentally have the same hash and therefore the hash can be used without knowing the password.
27
Downgrade Attack
Forcing a system to use a lower quality mehtod of communication. Mostly in place so systems can talk to legacy systems. Used in MITM
28
Adverserial AI
Tained data fed into machine learning system
29
Supply Chain Attack
Attack on an organization by targeting less secure elements in a supply network
30
Cloud Based Attack