Domain 1: Threats, Attacks, & Vulnerabilities Flashcards
Shimming
(Driver Manipulation)
Attacker wraps malicious code around legitimate code, such as a driver, to elevate their privilege or install backdoors(
Refactoring
(Driver Manipulation)
Restructures older code to improve it without changing the output behaviors or functionality. Refactoring attack takes advantage of this and adds malicious code unbeknownst to the end user
Active Reconnaissance
Utilizes an intrusive technique like scanning, hands-on testing, and probing of the network to determine vulnerabilities. Interacting with the system
Address Resolution
Converts an IP address to a MAC address
Adversary tactics, techniques, and procedures (TTP)
(Research Resources)
Describes the behaviors and strategies used by a threat actor to develop cyberattacks
Advisories and Bulletins
(Threat Hunting)
Provide summaries of new vulnerabilities
Agile Model (Software Developement)
Process of developing code that is rapid and highly-collaborative.
Software development that is performed in small increments to allow more adaptivity and room to change
Application Programming Interface (API) Attacks
Hostile usage, or attempted hostile usage, of an API from automated threats such as access violations, bot attacks or abuse.
Radio Frequency Identification (RFID)
(Wireless Attack)
Devices that uses a radio frequency signal to transmit identifying info about the device or token holder
Automated Indicator Sharing (AIS)
(Threat Intelligence Sources)
Enables organizations to share & receive machine-readable cyber threat indicators. Speeds up the process of sharing indicators of compromise to support more real-time defense
Bash
(Malicious code or script execution)
Shell/Scripting Language
Birthday Attack
(Cryptographic Attack)
Occurs when an attacker sends 2 different messages through a hash algorithm and it results in the same identical hash digest causing a collision
Brute Force Offline
(Password Attack)
Attacker has access to encrypted material or password hash & tries different keys offline without the risk of discovery
Attempt to discover passwords from a captured database or captured packet scan
Focuses on trying multiple passwords for a single user
Bug bounty
(Penetration Testing)
Deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bug
Cleanup
(Penetration Testing)
Ensures that all installed backdoors or rootkits have been removed, and it should return the system configuration to its original, pre-engagement state
Common Vulnerabilities and Exposures/Common Vulnerability Scoring System (CVE/CVSS)
(Vulnerability Scans)
Provides a reference-method for publicly known information-security vulnerabilities and exposures.
Configuration review
(Vulnerability Scans)
Audits and tests a network system, server or device to ensure it meets current security standards along with any applicable security policies
Credential Harvesting
(Social Engineering Techniques)
Attacks that stockpile databases of usernames, passwords, & sensitive info
Credentialed Scans
(Vulnerability Scans)
Provides more accurate scanning to better identify attacks
Criminal syndicates
Criminal Organization
Cross Site Request Forgery (CSRF)
Attack that forces end user to execute unwanted actions on a web application where they’re currently authenticated
Crypto malware
(Malware)
Type of ransomware that uses encryption to block access to data. Difficult to overcome without paying the ransom or having a backup
Data exfiltration
Occurs when malware or an attacker carries out an unauthorized data transfer from a computer
Disassociation
(Wireless Attack)
Hacker forces a device to lose internet connectivity either temporarily or for extended time