Exploits & Attacks Flashcards

1
Q

Exploits

A

A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

netstat

A

A command-line tool used for showing network statistics, specifically the ports and IP addresses on your computer system that can communicate with other hosts on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS attack

A

A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt. If one host is involved in the attack, the attack is considered to be a DoS attack. If multiple hosts are involved, it is a DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnet

A

Software that replicates and infects many computers, turning the computer into a “zombie”. Zombie devices are remotely controlled by an attacker for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keylogger

A

Software and hardware that track all keyboard clicks, including backspaces, to discover usernames, passwords, credit card numbers, and other sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Man-in-the-Middle (MITM)

A

A human-based attack in which the malicious user intercepts communication between the victim’s computer and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Software that locks your computer and makes it inoperable, requiring you to pay someone to remove it. Ransomware can spread like a virus, worm, or trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkit

A

Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forceful Directory Browsing

A

When hackers can use their knowledge of a web server’s directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTP (File Transfer Protocol)

A

Lets computers copy files to and from devices on a network. If malicious users are able to “FTP” to your computer, they can deliver malware to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMTP (Simple Mail Transfer Protocol)

A

A communication protocol for electronic mail transmission. It has a history of vulnerabilities and weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Loose-lipped errors

A

When HTTP requests fail or when systems crash, the system often provides some feedback as to why. Error messages can provide instructive information to a user, but also can be a rich source of intelligence to potential hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cross-site scripting (XSS)

A

A type of exploit in which the attacker inserts malicious client-side code into web pages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

XSS Stored Attack

A

Similar to an XSS-reflected attack with one major difference: This exploit permanently stores the malware script in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command Execution (Injection) attack

A

an attack in which the goal is the execution of arbitrary commands on the host operating system via a vulnerable application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly