Domain One: Threats, Attacks and Vulnerabilities Flashcards
(152 cards)
What is an Indicator of Compromise ?
Indicators of compromise are indications or signs that unauthorised activity has compromised an information system.
What are common signs of IOCs ?
- Unusual Outbound Activity
- Anomalies in privileged user account or activity
- Geographical irregularities in network traffic
- Account Login Redflags - failed attempts
- Increases in database read volumes
- HTML response size increases
- Large number of requests for same files
- Mismatched port-application traffic - Hackers often try to hide what they do by using an encrypted vpn over a standard port
- Suspicious registry of file changes
- Unusual DNS Requests - An indicator of a command and control compromise where a bot is trying to contact its command
- Unexpected System Patching - Hackers may apply these to keep other attackers out or fool a Sys admin into complacency
- Mobile device profile changes
- Bundles of data in the wrong places - An indicator information has been moved to a location with outbound access as a pre-cursor to exfiltration
- Web Traffic with non-human behaviour - Again bots trying on a fast and repetitive schedule than no human could achieve
- Signs of DDoS attempts even if temporary
What frameworks automate IOCs ?
OpenIOC - Opensource sharing of IOCs
Stix/Taxii/Cybox - Automated sharing of IOCs
What is polymorphic malware ?
Malware that changes its code after each use making each replicant different for detection purposes - an example is changing the file hash or file type
What is a virus ?
Is malware that infects and uses other codes infrastructure and environments and uses its executable code and privileges
What is an amoured virus ?
Is a virus that uses encryption as a layer of protection against reverse engineering
What is ransomware ?
Is a denial of service attack that locks the user out of their system until the encryption key is transferred in exchange for monetary gain.
What is a worm ?
Unlike a virus that piggy backs off a legitimate entity the worm is self replicating and does not need a host
What is a Trojan ?
A program that charades with one characteristic of functionality but it has another nefarious purpose
What is a rootkit ?
Designed to specifically change the OS to facilitate non-standard activity
What is a keylogger ?
Software that logs every keystroke of an end user
What is Adware ?
Software supported by advertising can also be a form of malware
What is Spyware ?
Malware that spies on user activity and reports stolen information.
What are bots ?
A piece of software that performs tasks under the control of another program
What is a rat ?
Trojan that exposes a back door to enable further attacks
What is a logic bomb ?
Deliberately installed piece of software that remains dormant until some event or time which then triggers malicious payload
What are some examples of social engineering ?
Phising
Tailgating
Impersonation
Third-Party Authorisation
Help Desk/Tech Support
Contractors/Outside Parties
Dumpster Diving - Trawling rubbish and waste for sensitive information
Shoulder Surfing
Hoax - Mainly on social media trying to get users to change security settings
Watering Hole Attack - Normally a compromised web site that draws users in and harvests their information. A watering hole attack differs from phishing and spear-phishing attacks, which typically attempt to steal data or install malware onto users’ devices but are often equally targeted, effective, and challenging to prevent. Instead, a watering hole attack aims to infect users’ computers then gain access to a connected corporate network. Cyber criminals use this attack vector to steal personal information, banking details, and intellectual property, as well as gain unauthorized access to sensitive corporate systems. Typically, attackers will target public websites frequented by professionals from specific industries, such as discussion boards, industry conferences, and industry-standard bodies.
What is Phishing ?
is a bulk generated non specific target attempt to illicit information by representation as a trusted third party. Quantity vs quality.
What is Spear Phising ?
targeted approach with higher success potential than phishing.
What is Whaling
a form of Spear Phishing aimed at a high valued target such as a CEO
What is Vishing ?
Phishing with voice technologies
What is smishing ?
SMS
What is Amplification ?
A type of denial of service designed to create sufficient enough packets to overwhelm a host such as a large server. Typically a ping request can be sent out to a large network with the return host address with that of the target. The target then gets overwhelmed.
Its hard to defend against because the attack is coming from a legitimate source.
What is Buffer overflow ?
One of the most commonly used attacks, buffer overflows happen when the input buffer used to hold input is overwritten with data that is larger than the buffer can handle. This generally happens when error checking is not present either due to poor coding practices or limitations of the language.
The overflow causes adjacent areas in memory to be overwritten causing instability.