Lesson 4 & 5 Flashcards

(80 cards)

1
Q

Pretexting

A

(form of impersonation) Using a scenario with convincing
additional detail The classic impersonation attack is for the social engineer to phone into a department,
claim they have to adjust something on the user’s system remotely, and get the user to
reveal their password. This specific attack is also referred to as pretexting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tailgating

A
  • Access premises covertly

* Follow someone else through a door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

• Piggy backing

A
  • Access premises without authorization, but with the knowledge of an employee
  • Get someone to hold a door open
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• Identity fraud

A
  • Impersonation with convincing detail and stolen or spoofed proofs
  • Identity fraud versus identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

• Invoice scams

A

• Spoofing supplier details to submit invoices with false account details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• Credential theft and misuse

A

Credential harvesting
• Shoulder surfing
• Lunchtime attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PHishing, whaling, vishing, spear fishing, sMishing

A

you know this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spam

A
  • Unsolicited email
  • Email address harvesting
  • Spam over Internet messaging (SPIM) (instant messagin service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hoaxes

A
  • Delivered as spam or malvertising
  • Fake advertisement to get user to install remote desktop software
  • Phone-based scams

Hoaxes, such as security alerts or chain emails, are another common social
engineering technique, often combined with phishing attacks. An email alert or web
pop-up will claim to have identified some sort of security problem, such as virus
infection, and offer a tool to fix the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prepending

A

adding text that appears to have been generated by the mail
system.

  • Tagging email subject line
  • Can be used by threat actor as a consensus or urgency technique
  • Can be added by mail systems to warn users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A

(passive technique)

• Redirection by DNS spoofing

Pharming is a passive means of redirecting users from a legitimate website to a
malicious one. Rather than using social engineering techniques to trick the user,
pharming relies on corrupting the way the victim’s computer performs Internet name
resolution, so that they are redirected from the genuine site to the malicious one. For
example, if mybank.foo should point to the IP address 2.2.2.2, a pharming attack would
corrupt the name resolution process to make it point to IP address 6.6.6.6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typosquatting

A

Www.comptia.org ==> www.connptia.org

Use cousin domains instead of redirection
• Make phishing messages more convincing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• Watering hole

A
  • Target a third-party site

* Customer, supplier, hobbies, social media…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Credential harvesting

A

• Attacks focused on obtaining credentials for sale rather than direct
intrusion
• Attacks focused on obtaining multiple credentials for single
company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Influence Campaigns

A
Sophisticated threat actors using multiple resources to change opinions on 
a mass scale
- Soft power
- Hybrid Warfare
-social Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Soft power

A

• Leveraging diplomatic and cultural assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

• Hybrid warfare

A

• Use of espionage, disinformation, and hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

• Social media (influence campaign)

A
  • Use of hacked accounts and bot accounts

* Spread rumor and reinforce messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

• Viruses and worms

A

• Spread within code without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Trojans

A

• A malicious program concealed within a benign one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

• Potentially unwanted programs/applications (PUPs/PAPs)

A

•Nonecessarily regarded as malicious
Pre-installed “bloatware” or installed alongside another app
• Not completely concealed, but installation may be covert
• Also called grayware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computer Viruses

A
• Rely on some sort of host file or 
media
• Non-resident/file infector
• Memory resident
• Boot
• Script/macro 
• Multipartite
• Polymorphic
• Vector for delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Multipartite

A

virus uses multiple vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Polymorphic

A

(virus) able to obfuscate code to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
• Early computer worms
* Propagate in memory/over network links | * Consume bandwidth and crash process
26
• Fileless malware
does not write code to disk. avoids detection "Living off the land"
27
Advanced persistent threat (APT)/advanced volatile threat (AVT)/ low observable characteristics (LOC)
All used to describe fileless live off the land malware
28
• Backdoor malware
Any type of access method to a host that circumvents the usual authentication method and gives the remote user administrative control can be referred to as a backdoor.
29
RAT
Remote Access Trojan backdoor malware that mimics the functionality of legitimate remote control programs
30
bots and botnet
A group of bots that are all under the control of the same malware instance can be manipulated as a botnet by the herder program. A botnet can be used for many types of malicious purpose, including triggering distributed denial of service (DDoS) attacks, launching spam campaigns, or performing cryptomining.
31
• Command & control (C2 or C&C)
Whether a backdoor is used as a standalone intrusion mechanism or to manage bots, the threat actor must establish a connection from the compromised host to a command and control (C2 or C&C) host or network.
32
Ransomware
Nuisance (lock out user by replacing shell) usually easier to fix
33
• Crypto-malware
High impact ransomware (encrypt | data files or drives)
34
• Cryptomining/crypojacking
• Hijack resources to mine | cryptocurrency
35
• Logic bombs
wait for a pre-configured time or date (time bomb) or a system or user event
36
Malware Indicators
Browser changes or overt ransomware notification • Anti-virus notifications • Endpoint protection platforms and next-gen A-V • Behavior-based analysis * Sandbox execution * Cuckoo ``` • Resource utilization/consumption • Task Manager and top • File system changes • Registry • Temp file ```
37
cukoo
does sandbox execution. puts the malware in a completely isolated location from the host
38
shellcode
Fileless malware uses lightweight shellcode to achieve a backdoor mechanism on the host. The shellcode is easy to recompile in an obfuscated form to evade detection by scanners.
39
Process analysis
Signature-based detection is failing to identify modern APT-style tools Looking for abnormal behavior
40
Process Explorer
Does process analysis
41
output from hashing
checksum, hash or digest
42
Anti collision
(hashing) - no two plaintexts likely to produce the same checksum
43
SHA
Secure Hash Algorithm (SHA) - considered the strongest algorithm
44
Message Disgest Algorithm (MD5)
for hashing. not as strong as SHA but sometimes required for compatibilities
45
Hashing
not encryption. process is not reversible
46
Substitution vs Transposition
Substitution - changing the letters or symbols Transposition - reordering
47
key protection
protecting the key is easier than protecting the algorithm
48
symetric encryption
Same key used for encryption and decryption on both sides Good fo bulk Problemtn distributing key securley
49
• Stream ciphers
* Encrypt and decrypt each bit/byte at a time | * Must be used with an initialization vector (IV)
50
• Block ciphers
* Treat data as equal-size blocks, using padding if necessary * Advanced Encryption Standard (AES/AES256)
51
Advanced Encryption Standard (AES)
s the default symmetric encryption cipher for most products. Basic AES has a key size of 128 bits, but the most widely used variant is AES256, with a 256-bit key.
52
Asyemmetric encryption
private and public key ``` Message size is limited to key size so not suitable for large amounts of data • Used for small amounts of authentication data ```
53
Public Key Cryptography Algorithms
RSA algorithm (Rivest, Shamir, Adleman) • Basis of many public key cryptography schemes • Trapdoor function • Easy to calculate with the public key, but difficult to reverse without the private key Elliptic curve cryptography (ECC) • Concerns about RSA being vulnerable to cryptanalysis • Another type of trapdoor function • Can use smaller keys to obtain same security
54
RSA
RSA algorithm (Rivest, Shamir, Adleman) • Basis of many public key cryptography schemes • Trapdoor function • Easy to calculate with the public key, but difficult to reverse without the private key
55
ECC
Elliptic curve cryptography (ECC) • Concerns about RSA being vulnerable to cryptanalysis • Another type of trapdoor function • Can use smaller keys to obtain same security
56
Digital Signatures
* Using public key cryptography with hashing * Digital signatures provide integrity, authentication, non-repudiation * RSA-based digital signatures Hashing - authentication & non repudiation RSA - integrity
57
Digital Envelopes and key exchange
hybrid - enable large amounts of data. able to send symetric key securely
58
Digital Certificate
Certificate authority validates authenticity foy signing PKI
59
Perferct Foward sectrcy
Uses Diffie Hellman key agreemen protocols | Allows two parties to derive the sam secret value that an eaves dropper cannot guess
60
cipher suite and mode of operation
In a protocol such as Transport Layer Security (TLS), the requirements to both authenticate the identity of the server and to encrypt communications between the server and client need to be fulfilled by separate cryptographic products and cipher implementations. The combination of ciphers supported is referred to as a ***cipher suite*. The server and client negotiate mutually compatible cipher suites as part of the TLS handshake. The final part of a cipher suite determines the bulk encryption cipher. When AES is selected as the symmetric cipher, it has to be used in a *mode of operation** that supports a stream of network data.
61
• Unauthenticated encryption
• Secret key encryption cannot prove integrity • Makes cryptographic system vulnerable to insertion and modification attacks
62
• Authenticated encryption
• Message authentication code (MAC) • Create a hash from combination of the message and a shared secret • Implementations vulnerable to padding oracle attacks
63
AEAD
* Authenticated encryption with additional data (AEAD) * Counter modes or stream ciphers that do not use padding * Associates message with context to prevent replay
64
Integrity (in cryptography)
• Using hash functions and message authentication codes to validate messages
65
• Resiliency
• Using cryptography to ensure authentication and integrity of control messages
66
Obfuscation (cryptography)
• Make something hard to understand • Encryption can perform this function, but it is very hard to secure an embedded key • White box cryptography
67
White box cryptography
attempts to protect an embedded key while preserviing functinality of the code - all attempts have been brokent
68
nonce
rever reuse the same key value
69
salt
random pseudo number. goes with hashing
70
• Man-in-the-Middle (MitM)
• Interferes with the public key presented to the client
71
• Downgrade attack
• Forces server into using weak protocol versions and ciphers
72
• Key stretching
* Use additional rounds to strengthen keys | * Makes attacker do more work so slows down brute force
73
Entropy
Entropy is a measure of disorder. A plaintext will usually exhibit low entropy [salting and stretching increases entropy]
74
Collision
Function produces same has value for two different plain texts
75
Birthday attack
brute force attack aimed to exploiting collisions in has functions
76
Post quantum
when quantum computing become reality
77
lightweight cryptograhy
low power devices. encryption take up power
78
Homomorphic Encryption
Supports data analytics functions while preserving confidentiality and privacy
79
Blockchain
Expanding list of transactional records (blocks) • Each block is linked by hashing * Public ledger * Ledger of transactions performed on a digital asset * Peer-to-peer so transactions are public * Transactions cannot be deleted or reversed • Widely used for cryptocurrencies • Potential uses for financial transactions, online voting systems, identity management systems, notarization, data storage,
80
Stenography
obfuscation ``` • Concealing messages within a covertext • Often uses file data that can be manipulated without introducing obvious artifacts • Image • Audio • Video • Covert channels ```