Malicious Activity Flashcards

(52 cards)

1
Q

What are the evolving concerns in the digital age?

A

Cyber attacks, increasing in frequency and sophistication

The digital landscape is constantly changing, resulting in new and more advanced cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the first step to effective prevention and mitigation of cyber threats?

A

Understanding Cyber Threats

Awareness of the tactics, techniques, and procedures employed by cybercriminals is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the variants of Distributed Denial of Service (DDoS) attacks?

A
  • Denial of Service
  • Amplified DDoS
  • Reflected DDoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of Domain Name Server (DNS) attacks?

A
  • DNS Cache Poisoning
  • DNS Amplification
  • DNS Tunneling
  • Domain Hijacking
  • DNS Zone Transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Directory Traversal Attack?

A

Injection attack when attacker inserts malicious cose through an application interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a Privilege Escalation Attack involve?

A

Exploiting system vulnerability to gain elevated access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Replay Attack?

A

Malicious or fraudulent repeat/delay of a valid data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Session Hijacking?

A

Attacker takes over a user session to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Malicious Code Injection Attacks?

A

Introduction of harmful code into a program or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some Indicators of Compromise (IoC)?

A
  • Account lockout
  • Concurrent session usage
  • Blocked content
  • Impossible travel
  • Resource consumption
  • Inaccessibility
  • Out-of-cycle logging
  • Published documents indicating hacking
  • Missing logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial of Service (DoS) attack?

A

An attack that attempts to make a computer or server’s resources unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Flood Attack?

A
  • Ping Flood
  • SYN Flood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Permanent Denial of Service (PDOS) Attack?

A

Exploits security flaws to break a networking device permanently by re-flashing its firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Fork Bomb?

A

Attack creates a large number of processes, consuming processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Distributed Denial of Service (DDoS) attack?

A

Malicious attempt to disrupt the normal functioning of a network by overwhelming it with a flood of internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a DNS Amplification Attack?

A

Allows an attacker to initiate DNS requests from a spoof IP address to flood a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a Black Hole or Sinkhole in DoS prevention?

A

Routes attacking IP traffic to a non-existent server through a null interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is DNS Cache Poisoning?

A

Corrupts a DNS resolver’s cache with false information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is DNS Tunneling?

A

Encapsulates non-DNS traffic over port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Domain Hijacking?

A

Unauthorized change of domain registration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Directory Traversal Attack?

A

An injection attack that allows access to commands, files, and directories

22
Q

What is Arbitrary Code Execution?

A

Vulnerability that allows an attacker to run their code without restrictions

23
Q

What is Remote Code Execution?

A

Type of arbitrary code execution that occurs remotely

24
Q

What is the difference between Vertical and Horizontal Privilege Escalation?

A
  • Vertical: From normal user to higher privilege
  • Horizontal: Accessing resources at the same level
25
What are rootkits?
Class of malware that conceals its presence by modifying system files
26
What is a Replay Attack?
Type of network-based attack where valid data transmissions are maliciously re-broadcast
27
What is a Credential Replay Attack?
Capturing a user's login credentials during a session and reusing them for unauthorized access
28
How can Replay Attacks be prevented?
* Use session tokens * Implement multi-factor authentication * Use security protocols like WPA3
29
What is Session Management?
Enables web applications to uniquely identify a user across different actions
30
What is a Cookie in web applications?
Text file used to store information about a user when they visit a website
31
What is Cookie Poisoning?
Modifies the contents of a cookie after it has been generated
32
What is an On-Path Attack?
An attack where the attacker positions their workstation logically between two hosts
33
What is ARP Poisoning?
Manipulating Address Resolution Protocol (ARP) tables to redirect network traffic
34
What is SSL Stripping?
An attack that tricks the encryption application into presenting an HTTP connection instead of HTTPS
35
What is LDAP Injection?
An application attack that targets web-based applications by fabricating LDAP statements
36
What is Command Injection?
Occurs when a threat actor is able to execute arbitrary commands on a system
37
What does LDAP stand for?
Lightweight Directory Access Protocol ## Footnote LDAP is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.
38
What is LDAP Injection?
An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input ## Footnote Protection against LDAP injection attacks includes input validation and input sanitization.
39
What is Command Injection?
Occurs when a threat actor is able to execute arbitrary shell commands on a host via a vulnerable web application
40
What is Process Injection?
Method of executing arbitrary code in the address space of a separate live process ## Footnote There are many different ways to inject code into a process, including DLLs, Thread Execution Hijacking, and Process Hollowing.
41
List some methods of Process Injection.
* Injection through DLLs * Thread Execution Hijacking * Process Hollowing * Process Doppel Ganging * Asynchronous Procedure Calls * Portable Executable Injections
42
What are some mitigation strategies for Process Injection?
* Endpoint security solutions configured to block common sequences of attack behavior * Security Kernel Modules * Practice of Least Privilege * Indicators of Compromise (IoC)
43
What does Indicators of Compromise (IoC) refer to?
Pieces of forensic data that identify potentially malicious activity on a network or system ## Footnote IoCs serve as digital evidence that a security breach has occurred.
44
What is an Account Lockout?
Occurs when an account is locked due to multiple failed login attempts ## Footnote It indicates a potential brute force attack to gain access.
45
What is Concurrent Session Usage?
Refers to multiple active sessions from a single user account ## Footnote It may indicate a possible account compromise.
46
What does Blocked Content imply?
Involves attempts to access or download content blocked by security protocols ## Footnote This suggests a user trying to access malicious content or an attacker attempting to steal data.
47
What does Impossible Travel indicate?
Detects logins from geographically distant locations within an unreasonably short timeframe ## Footnote It indicates a likely account compromise.
48
What is Resource Consumption?
Unusual spikes in resource utilization ## Footnote This includes CPU, Memory, and Network bandwidth, and may indicate malware infections or DDoS attacks.
49
What is Resource Inaccessibility?
Inability to access resources like files, databases, or network services ## Footnote It suggests a ransomware attack, where files are encrypted, and a ransom is demanded.
50
What does Out-of-Cycle Logging indicate?
Log entries occurring at unusual times ## Footnote It suggests an attacker trying to hide their activities during off-peak hours.
51
What are Missing Logs a sign of?
Sign that logs have been deleted to hide attacker activities ## Footnote This may result in gaps in the log data, making it harder to trace the attacker's actions.
52
What does the publication of Articles or Documents by attackers imply?
Attackers publicly disclose their actions, boasting about their skills or causing reputational damage ## Footnote This can occur on social media, hacker forums, or the victim's own website.