Attacks, Threats, and Vulnerabilities Flashcards

1
Q

viruses

A

An unsolicited and unwanted malicious program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crypto-malware

A

A malicious program that encrypts programs and files on the computer in order to extort money from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomware

A

Denies access to a computer system or data until a ransom is paid. Can be spread through a phishing email or unknowingly infected website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worm

A

A self-contained infection that can spread itself through networks, emails, and messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

A form of malware that pretends to be a harmless application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

backdoor program that allows full remote access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keylogger

A

A malicious program that saves all of the keystrokes of the infected machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A

A program that produces ads and pop ups using your browser, may replace the original browser and produce fake ads to remove the adware in order to download more malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spyware

A

Software that installs itself to spy on the infected machine, sends the stolen information over the internet back to the host machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bots

A

AI that when inside an infected machine performs specific actions as a part of a larger entity known as a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAT (Remote Access Trojan)

A

A remotely operated Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic bomb

A

A malicious program that lies dormant until a specific date or event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backdoor

A

Allows for full access to a system remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

Sending a false email pretending to be legitimate to steal valuable information from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spear phishing

A

Attacks that target specific users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whaling

A

An attack on a powerful or wealthy individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vishing

A

An attack through a phone or voice communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Tailgating

A

Closely following individuals with keys to get access to secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Impersonation

A

Taking on the identity of an individual to get access into the system or communications protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dumpster diving

A

Going through a business’s or person’s trash to find thrown away valuable information or possessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Shoulder surfing

A

Watching as a person enters information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hoax

A

False information that deceives the user into compromising security by making them believe they are at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Watering hole attack

A

A security attack that targets a specific highly secured group by infecting a commonly visited website by the group’s members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Authority

A

The actor acts as an individual of authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Intimidation

A

Frightening or threatening the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Consensus

A

Influenced by what others do, everyone else does it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Scarcity

A

Limited resources and time to act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Familiarity

A

The victim is well known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Trust

A

Gain their confidence, be their friend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Urgency

A

Limited time to act, rush the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Application/service attacks: DoS (Denial of Service):

A

Flooding a target machine or resource with many requests to overload the system and prevent use of its resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Application/service attacks: DDoS (Distributed Denial of Service)

A

Multiple different sources attack one victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Application/service attacks: Man-in-the-middle

A

The attacker alters the communication between two parties who believe they are directly communicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Application/service attacks: Buffer overflow

A

A program attempts to write more data than can be held in fixed block of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Application/service attacks: Injection

A

Occurs from processing invalid data, inserts code into the vulnerable computer program and changes the course of execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Application/service attacks: Cross-site scripting (XXS)

A

Found in web applications, allows for an attacker to inject client-side scripts in web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Application/service attacks: Cross-site request forgery (XSRF)

A

Unauthorized commands are sent from a user that is trusted by the website. Allows the attacker to steal cookies and harvest passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Application/service attacks: Privilege escalation

A

An attack that exploits a vulnerability that allows them to gain access to resources that they normally would be restricted from accessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Application/service attacks: ARP poisoning

A

The act of falsifying the IP-to-MAC address resolution system employed by TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Application/service attacks: Amplification

A

The amount of traffic sent by the attacker is originally small but then is repeatability multiplied to place a massive strain on the victim’s resources, in an attempt to cause it to fail or malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Application/service attacks: DNS poisoning

A

Is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Application/service attacks: Domain hijacking

A

The act of changing the registration of a domain name without the permission of the victim

43
Q

Application/service attacks: Man-in-the-browser

A

A proxy Trojan horse that infects web browsers and capture browser session data

44
Q

Application/service attacks: Zero day

A

The aim is to exploit flaws or vulnerabilities in targeted systems that are unknown or undisclosed to the world in general. Meaning that there is no direct or specific defense to the attack; which puts most systems vulnerable assets at risk

45
Q

Application/service attacks: Replay

A

Is a network-based attack where a valid data transmission is rebroadcasted, repeated, or delayed

46
Q

Application/service attacks: Pass the hash

A

An authentication attack that captures and uses the hash of a password. The attacker then attempts to log on as the user with the stolen hash. This type of attack is commonly associated with the Microsoft NTLM (New Technology LAN Manager) protocol

47
Q

Hijacking and related attacks: Clickjacking

A

Deceives the user into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page

48
Q

Hijacking and related attacks: Session hijacking

A

An attack in which an attacker attempts to impersonate the user by using their legitimate session token

49
Q

Hijacking and related attacks: URL hijacking

A

Redirects the user to a false website based on misspelling the URL, and is also referred to typosquatting

50
Q

Hijacking and related attacks: Typosquatting

A

An alternate name for URL hijacking

51
Q

Driver manipulation: Shimming

A

The process of injecting alternate or compensation code into a system in order to alter its operations without changing the original or existing code

52
Q

Driver manipulation: Refactoring

A

Rewrites the internal processing of code without changing its behavior.

53
Q

MAC spoofing

A

The attacker falsifies the MAC address of a device

54
Q

IP spoofing:

A

An intruder uses another site’s IP address to masquerade as a legitimate site

55
Q

Wireless attacks: Replay

A

This is a passive attack where the attacker captures wireless data, records it, and then sends it on to the original recipient without them being aware of the attacker’s presence

56
Q

Wireless attacks: IV (Initialization Vector):

A

A random number used to increase security by reducing predictability and repeatability

57
Q

Wireless attacks: Evil twin

A

Has same SSID (Service Set Identifier) as a proper access point (AP). Once a user connects to it, all wireless traffic goes through it instead of the real AP

58
Q

Wireless attacks: Rogue AP

A

An unauthorized WAP (Wireless Access Point) or Wireless Router that allows for attackers to bypass many of the network security configurations and opens the network and its users to attacks

59
Q

Wireless attacks: Jamming

A

Disabling a wireless frequency with noise to block the wireless traffic

60
Q

Wireless attacks: WPS (WiFi Protected Setup):

A

Allows users to easily configure a wireless network, sometimes by using only a PIN. The PIN can be found through a brute force attack

61
Q

Wireless attacks: Bluejacking

A

Sending unauthorized messages to a Bluetooth device

62
Q

Wireless attacks: Bluesnarfing

A

Gaining unauthorized access to, or stealing information from a Bluetooth device

63
Q

Wireless attacks: RFID (Radio Frequency Identifier):

A

Communicates with a tag placed in or attached to an object using radio signals. Can be jammed with noise interference, the blocking of radio signals, or removing/disabling the tags themselves

64
Q

Wireless attacks: NFC (Near Field Communication):

A

A wireless technology that allows for smartphones and other devices to establish communication over a short distance

65
Q

Wireless attacks: Disassociation

A

Removes clients from a wireless network

66
Q

Cryptographic attacks: Birthday

A

Used to find collisions in hashes and allows the attacker to be able to create the same hash as the user. Exploits that if the same mathematical function is performed on two values and the result is the same, then the original values are the same

67
Q

Cryptographic attacks: Known plain text/cipher text

A
  1. Plain text: The attacker has both the plaintext and its encrypted version.
  2. Cipher text: The attacker has access only to the encrypted messages.
68
Q

Cryptographic attacks: Rainbow tables

A

Large pregenerated data sets of encrypted passwords used in password attacks

69
Q

Cryptographic attacks: Dictionary

A

A password attack that creates encrypted versions of common dictionary words and then compares them against those in a stolen password file. Guessing using a list of possible passwords

70
Q

Cryptographic attacks: Brute force

A

A password-cracking program that tries every possible combination of characters through A to Z.

71
Q

Cryptographic attacks: Online vs. offline

A
  1. Online: Is against a live logon prompt.
  2. Offline: The attack is working on their own independent computers to compromise a password hash
72
Q

Cryptographic attacks: collision

A

When two different inputs produce the same hash value

73
Q

Cryptographic attacks: Downgrade

A

Forces a system to lessen its security, this allows for the attacker to exploit the lesser security control. It is most often associated with cryptographic attacks due to weak implementations of cipher suites. Example is TLS > SSL, a man-in-the-middle POODLE attack exploiting TLS v1.0 - CBC mode

74
Q

Cryptographic attacks: Replay

A

The attacker captures network packets and then retransmits them back onto the network to gain unauthorized access

75
Q

Cryptographic attacks: Weak implementations:

A

The main cause of failures in modern cryptography systems are because of poor or weak implementations instead of a failure caused by the algorithm itself

76
Q

Threat actor types: Script kiddies

A

A person who uses pre-existing code and scripts to hack into machines, because they lack the expertise to write their own.

77
Q

Threat actor types: Hacktivist

A

An individual who is someone who misuses computer systems for a socially or politically motivated agenda. They have roots in the hacker culture and ethics. Hacker on a mission

78
Q

Threat actor types: Organized crime

A

These are professionals motivated ultimately by profit. They have enough money to buy the best gear and tech. Multiple people perform specific roles: gathering data, managing exploits, and one who actually writes the code

79
Q

Threat actor types: Nation states/APT

A

An APT is an advanced persistent threat, these are massive security risks that can cost companies and countries millions of dollars. Nation states have very sophisticated hacking teams that target the security of other nations. They often attack military organizations or large security sites, they also frequently attack power plants

80
Q

Threat actor types: Insiders

A

Someone who is inside the company who has intricate knowledge of the company and how its network works. They can pinpoint a specific vulnerability and may even have access to multiple parts of the network

81
Q

Threat actor types: Competitors

A

Rival companies, can bring down your network or steal information through espionage

82
Q

Threat actor types: Level of sophistication:

A

Is the skill of the hacker and the complexity of the attack

83
Q

Threat actor types: Resources/funding

A

The amount of money and the value of the tech and gear being used

84
Q

Threat actor types: Intent/motivation

A

The reason for the attack, can be for political, monetary, or social reasons

85
Q

Threat actor types: Use of open-source intelligence (OSINT)

A

Data that is collected through publicly available information. This can be used to help make decisions. Can be used by threat actors to help find their next target or how to best attack their target. OSINT is also incredibly helpful for mitigating risks and for identifying new threat actors.

86
Q

Threat actor types: Internal/external

A

Internal is inside the company, can be intentional, unintentional, or an act of God. External is someone outside the company trying to get in.

87
Q

Penetration testing concepts: Active reconnaissance:

A

Is the use of tools to send data to systems and then understanding their responses. Usually starts with various network and vulnerability scanners. Can be incredibly illegal and should not be engaged without being prepared and proper authorization

88
Q

Penetration testing concepts: Passive reconnaissance:

A

You are not touching any of the target’s equipment. Instead you are going through and gathering that is already available. Forums and social media are great sources for gathering information about the company and its employees

89
Q

Penetration testing concepts: Pivot

A

In penetration testing it is using a compromised machine to attack other machines on the same network. Attacking and gaining access to an area of lower security in order to be more likely to have a successful attack on an area of greater security. Is also referred to as island hopping

90
Q

Penetration testing concepts: Initial exploitation

A

Usually the hardest part. A vulnerability is taken advantage of to get into the network or system

91
Q

Penetration testing concepts: Persistence

A

Installing backdoors or methods to keep access to the host or networks

92
Q

Penetration testing concepts: Black box

A

You know nothing of the network, you have no prior knowledge

93
Q

Penetration testing concepts: White box

A

You are given a network map and you have full knowledge of the configurations allowing you to perform specific tests

93
Q

Penetration testing concepts: Gray box

A

Knowledge of the network but not incredibly detailed

94
Q

Penetration testing concepts: Penetration testing vs. vulnerability scanning:

A

Penetration testing is an active attack on the network to exploit vulnerabilities, can assess potential damages and the potential of the exploits being found. Is done by a human. Vulnerability scans passively scans and identifies vulnerabilities. Is automated

95
Q

Penetration testing concepts: Escalation of privilege

A

Allows for a user to get a higher-level access than what authentication allows for. Can be resolved through patching and updating. Typically related to a bug or vulnerability

96
Q

Vulnerability scanning concepts: Passively test security controls

A

Uses an automated vulnerability scanner. Observes and reports findings. Does not take down systems, applications, or services, and doesn’t disrupt business

97
Q

Vulnerability scanning concepts: Identify vulnerability

A

Understanding common attacks and taking inventory of vulnerabilities

98
Q

Vulnerability scanning concepts: Identify lack of security controls

A

Vulnerability scanners can identify missing patches or antivirus

99
Q

Vulnerability scanning concepts: Identify common misconfigurations

A

Weak passwords, default usernames and passwords, and open ports.

100
Q

Vulnerability scanning concepts: Intrusive vs. non-intrusive

A

Intrusive testing can interrupt service, is much more detailed, and exploits vulnerabilities. Non-intrusive is more passive, does not exploit vulnerabilities, and does not disrupt service

101
Q

Vulnerability scanning concepts: Credentialed vs. non-credentialed

A

Credentialed are done as though it is inside the network, emulates an insider attack. Non-credentialed are done as though it is outside the network, emulates an outside attack. Shows what would be found if the network was scanned

102
Q

Vulnerability scanning concepts: False positive:

A

A result which shows incorrectly that a condition or attribute is present. A false vulnerability.

103
Q

Vulnerability scanning concepts: Identify lack of security controls

A

Vulnerability scanners can identify missing patches or antivirus