Chapter 1.2 Flashcards

1
Q

shim

A

The code library to enable legacy mode is a shim. The shim must be added to the registry and its files added to the system folder. The shim database is a way that allows malware to run with persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

rainbow tables

A

Rainbow tables are associated with attacks where an attacker uses a set of related plaintext passwords and their hashes to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP poisoning

A

To sniff all traffic on a switched network, the switch must be overcome using ARP poisoning. ARP poisoning occurs when an attacker, with access to the network, redirects an IP address to the MAC address of an unintended computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS spoofing

A

Domain Name System (DNS) spoofing is an attack that compromises the name resolution process, and can be used to facilitate pharming or Denial of Service (DoS) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP spoofing

A

IP spoofing occurs when an attacker sends IP packets from a false (or spoofed) source address to communicate with targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP/IP hijacking

A

Transmission Control Protocol/Internet Protocol (TCP/IP) hijacking is a type of spoofing attack where the attacker disconnects a host, then replaces it with his or her own machine, spoofing the original host’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DRDoS

A

In a Distributed Reflection Denial of Service (DRDoS) attack, the adversary spoofs the victim’s IP address and attempts to open connections with multiple servers. Those servers direct their SYN/ACK responses to the victim server. This rapidly consumes the victim’s available bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smurf attack

A

In a Smurf attack, the adversary spoofs the victim’s IP address and pings the broadcast address of a third-party network. Each host directs its echo responses to the victim server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MitB

A

A MitB attack is where the web browser is compromised by installing malicious plug-ins, scripts or intercepting API calls. Vulnerability exploit kits can be installed to a website and actively try to exploit vulnerabilities in clients browsing the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

skimming

A

Skimming is an RFID attack where an attacker uses a fraudulent RFID reader to read the signals from a contactless bank card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS spoofing vs DNS cache poisoning

A

cache poisoning involves attacking the DNS server, while spoofing attacks a cilent’s DNS host file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pass-the-hash

A

Pass-the-hash occurs when the attacker steals hashed credentials and uses them to authenticate to the network. This type of attack is prevented by using once-only session tokens or timestamping sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

birthday attack

A

A birthday attack is a type of brute force attack aimed at exploiting collisions in hash functions. This type of attack can be used for forging a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

downgrade attack

A

A downgrade attack is used to facilitate a Man-in-the-Middle (MitM) attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

replay attack

A

A replay attack consists of intercepting a key or password hash, then reusing it to gain access to a resource. This type of attack is prevented by using once-only session tokens or timestamping sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly