Chapter 7: Protecting Against Advanced Attacks Flashcards

(61 cards)

1
Q

What is a Denial-of-Service (DoS)?

A

An attack that makes a service unavailable by overwhelming it with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Distributed Denial-of-Service (DDoS)?

A

A DoS attack launched from multiple systems simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Resource Exhaustion?

A

Draining a system’s resources to degrade its performance or outright cause it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Reflected DDoS?

A

A DDoS that tricks legitimate servers into flooding a target with responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Amplified DDoS?

A

A DDoS that uses small requests to trigger larger responses from servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SYN Flood?

A

A DoS attack that overwhelms a server by not completing TCP handshakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Forgery?

A

An attack that occurs when an attacker creates a fake identity, certificate, file, or other object in an attempt to fool unsuspecting users or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Spoofing?

A

An example of forgery, occurs when one person or entity impersonates someone or something else (IP Spoofing, MAC Spoofing, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is On-Path Attack? AKA man-in-the-middle attack.

A

An attack where the attacker intercepts and potentially alters communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Attacker-in-the-browser attack?

A

A malware-based attack that manipulates browser sessions in real-time, often to intercept or alter sensitive data like banking transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SSL Stripping?

A

Downgrading HTTPS to HTTP to intercept unencrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DNS Poisoning?

A

Tampering with DNS records to redirect users to fake sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Pharming Attack?

A

Redirecting users to malicious websites through DNS manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is URL Redirection?

A

Sending users to different, often malicious, websites without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Domain Hijacking?

A

Taking unauthorized control of a domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DNS Filtering?

A

Blocking harmful websites by preventing DNS resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a DNS Sinkhole?

A

A fake DNS server that traps malicious traffic for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Replay Attack?

A

Reusing captured data packets to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Credential Replay?

A

Reusing valid login credentials to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Input Validation?

A

Checking user input to prevent malicious data from entering a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some good practices when verifying user input?

A

Verifying proper characters, blocking HTML code, prevent the use of certain characters, and implementing boundary/range checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Race Conditions?

A

A flaw where two or more processes access shared data at the same time, leading to unpredictable results or vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Time of Check to Time of Use (TOCTOU)

A

A flaw where a system’s state changes between checking a condition and using it, leading to security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Error Handling?

A

The process of managing unexpected conditions in software to ensure stability and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are good examples of proper Error Handling?
Logging errors internally while showing generic messages to users to avoid system info exposure.
26
What is Code Obfuscation?
A technique to make code unreadable or harder to reverse-engineer, often used to protect intellectual property.
27
What is a Compiler?
A program that converts source code into machine-readable instructions.
28
What are some potential vulnerabilities with outsourced code development?
Code does not perform expected tasks, code may have vulnerabilities that can be exploited, malicious code may be present, and lack of updates.
29
What are some best practice headers for HTTPS?
HTTP Strict Transport Security, Content-Security-Policy, and X-Frame-Options.
30
What is a Cookie?
A small file used by websites to store user session data and preferences.
31
What is a Secure Cookie?
A cookie transmitted only over HTTPS to protection it from interception.
32
What is Code Signing?
The process of digitally signing code to verify its integrity and source.
33
What is Static Code Analysis?
A method to detect code issues by analyzing code without running it.
34
What is a Manual Code Review?
A person reviewing code to catch errors or vulnerabilities.
35
What is Dynamic Code Analysis?
Evaluating software for issues while its running.
36
What is Fuzzing?
A method that bombards software with unexpected inputs to find security flaws.
37
What is Sandboxing?
A security method that isolates programs in a controlled environment to prevent them from harming the system or accessing sensitive data.
38
What is Package Monitoring?
Watching software dependencies for updates and vulnerabilities.
39
What is Software Version Control?
A system that tracks and manages changes to source code over time.
40
What is a Secure Development Environment?
A coding setup hardened with security measures to reduce vulnerabilities during development.
41
What are the multiple stages of a good secure development environment?
Development, Test, Staging, Production, Quality Assurance (QA) (the process can look different across different organizations).
42
What is a database?
A structured system for storing, managing, and retrieving data electronically.
43
What is SQL?
A language for querying and managing data in relational databases.
44
What is an SQL Query?
A command used to interact with and manipulate data in a database (e.g. SELECT * FROM users).
45
What are Stored Procedures?
Precompiled SQL statements stored in a database to perform tasks and improve performance and security.
46
What is an SQL Injection?
An attack where malicious SQL is inserted into a query to manipulate or access database data.
47
What is a Memory Leak?
When a program doesn't release unused memory, leading to performance issues. Can cause a system to crash.
48
What is Buffer Overflow?
Writing more data to a buffer than it can hold, potentially causing crashes or code execution.
49
What is Memory Injection?
A technique where malicious code is injected directly into a program's memory to execute stealthy attacks without touching the disk.
50
What is Integer Overflow?
When a calculation exceeds an integer's maximum value, leading to errors and vulnerabilities.
51
What are Dynamic Link Library (DLL) Injections?
Injecting a malicious DLL into a process to run unauthorized code.
52
What is an LDAP Injection?
Manipulating LDAP queries to gain unauthorized access to directory services.
53
What is an Extensible Markup Language (XML) Injection?
Injecting malicious XML into an application to change logic or access data.
54
What is Directory Traversal?
An attack that exploits file path manipulation to access unauthorized directories or files.
55
What is Cross-site Scripting?
A web attack where malicious scripts are injected into trusted websites.
56
What is Reflected XSS/non-persistent?
XSS where a script is immediately reflected in a response, often via a URL. The injected script is only temporarily present.
57
What is Stored XSS/persistent?
XSS where malicious scripts are saved on a server and executed later by other users.
58
What is Script Automation?
Using scripts to automate tasks, often leveraged for efficiency or large-scale attacks.
59
What are some common use cases for Script Automation?
User provisioning, Resource Provisioning, Guardrails, Ticket Creation, Escalation, Enabling/disabling services and access, Continuous integration and testing, Integration and Application Programming Interfaces (APIs).
60
What are some of the benefits of Script Automation?
Efficiency/Saves Time, Enforces Security Baselines, Standard Infrastructure Configuration, Employee Retention, Reaction Time, And Workforce Multiplier.
61
What are some considerations that should be taken when implementing Script Automation?
Complexity, Cost, Single Point of Failure, Technical Debt, and Ongoing Supportability.