Section 1 – Attacks, Threats, and Vulnerabilities Flashcards

1
Q

Typosquatting

A

Also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

URL hijacking

A

Targeting people on the internet who incorrectly type a website’s domain name in the browser.

Scammers register domain names that may seem similar to the original brand name, except there is a small typo in the domain that can be easily missed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prepending

A

When an attacker prepends, or attaches, a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order to make the message appear more trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretexting

A

Is a form of social engineering in which an attacker gets access to information, a system or a service through deceptive means. The attacker will present a false scenario — or pretext — to gain the victim’s trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

A

redirects internet users to fake websites to steal user data. It’s generally carried out by using one of the following techniques: Malware, DNS cache poisoning, Host file modification, Rogue DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vishing

A

Is short for “voice phishing,” which involves defrauding people over the phone, enticing them to divulge sensitive information. In this definition of vishing, the attacker attempts to grab the victim’s data and use it for their own benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smishing

A

Is a form of phishing, which uses social engineering to trick someone into revealing private information. However, the attack is executed using a text message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reconnaissance

A

Gather information on the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spear phishing, whaling

A

Is a strategic phishing attack, targeted towards high profile executives, that is disguised as a permitted email. An attacker can prod the target for information that helps them access sensitive areas of the network, passwords, or other user information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Impersonation

A

Is a type of targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data from unsuspecting employees using social engineering tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hoaxes

A

Is a fake warning about a virus or other piece of malicious code. Typically a hoax takes the form of an e-mail or other message warning the reader of a dangerous new virus and suggesting that the reader pass the message on.
Hoaxes cause no damage in themselves, but their distribution by well-meaning people often causes fear and uncertainty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering hole attack

A

Is a form of cyberattack that targets groups of users by infecting websites that they commonly visit.
Watering hole attacks are relatively rare, but they continue to have a high success rate. That is because they target legitimate websites that cannot be blacklisted, and cyber criminals deploy zero-day exploits that antivirus detectors and scanners will not pick up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware types

A

Virus, Crypto, Ransomware, Worms, Trojan Horse, Rootkit, Keyloggers, Adware/Spyware, Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Horse

A

SW pretends to be something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rootkit

A

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worms

A

Uses the network as a transmission media, replicates by itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus vs Worm?

A

Virus needs to be executed, Worm replicates automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spraying attack

A

brute force logins based on list of usernames with default passwords on the application. An attacker will use one password against many different accounts on the application to avoid account lockouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rainbow table

A

tables of reversed hashes used to crack password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Password salting

A

technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Skimming

A

Skimming occurs when devices illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps capture data or record cardholders’ PINs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Birthday attack

A

Type of brute force attack. Is a form of cryptographic attack that cracks mathematical algorithms by looking for matches in the hash function. The strategy relies upon the birthday paradox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Downgrade attack

A

is an attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Collision (hash)

A

When two inputs producing the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Man-in-the-middle attack
this attack constitutes an interception of a data transfer or other digital communication. By doing this, the attacker gains access to exchanges that are supposed to be secured.
25
Data Execution Prevention (DEP)
a system-level memory protection feature that is built into the operating system starting with Windows XP and Windows Server 2003. DEP enables the system to mark one or more pages of memory as non-executable.
26
Cross-site Scripting (XSS) attacks
are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.
27
Pass-the-Hash attack
an attacker captures a password hash (as opposed to the password characters) and then simply passes it through for authentication and potentially lateral access to other networked systems.
28
Replay attack
occurs when transmitted authentication or access control information is intercepted and then re-transmitted to either produce an unauthorized effect or gain unauthorized access.
29
Session hijacking attack
compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.
30
Web Application Firewall (WAF)
filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others
31
reverse proxy
sits in front of one or more web servers, intercepting requests from clients. Helps with Load balancing, Protection from attacks, Global Server Load Balancing, Caching, SSL encryption
32
Zero-day attack
happens once that flaw, or software/hardware vulnerability, is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability
33
Shimming (ATM)
fraudsters insert a “shim” into the card reader that allows them to copy the chip-card information
34
SSL stripping attacks
(also known as SSL downgrade or HTTP downgrade attacks) are a type of cyber attack in which hackers downgrade a web connection from the more secure HTTPS to the less secure HTTP. They act as a man in the middle by establishing their own HTTPS connection with the website (posing as the user) and maintaining the HTTP connection with the user
35
Eavesdropping attack
also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device.
36
Time-of-check Time-of-use (TOCTOU)
a class of software bugs caused by a race condition involving the checking of the state of a part of a system (such as a security credential) and the use of the results of that check.
37
Null-pointer dereference
A null-pointer dereference takes place when a pointer with a value of NULL is used as though it pointed to a valid memory area, typically causing a crash or exit.
38
Directory traversal
(also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files. In some cases, an attacker might be able to write to arbitrary files on the server
39
Input sanitization
A measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and strings to prevent the injection of harmful codes into the system.
40
Cross-Site Request Forgery (CSRF)
CSRF (also XSRF, or one-click attack, or session riding) an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. With a little help of social engineering, an attacker may trick the users of a web application into executing actions of the attacker’s choosing.
41
Server-side request forgery
SSRF is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location.
42
Shimming (drivers)
is additional code that can be run instead of the original driver. When an application attempts to call an older driver, the operating system intercepts the call and redirects it to run the shim code instead.
43
Refactoring (drivers)
set of techniques used to identify the flow and then modify the internal structure of code without changing the code’s visible behavior
44
Resource exhaustion
computer security exploits that crash, hang, or otherwise interfere with the targeted program or system. They are a form of denial-of-service attack
45
Advanced persistent threat (APT)
An attack campaign in which an intruder establishes an illicit, long-term presence on a network in order to mine highly sensitive data
46
State actors
Operating on behalf of nation-states primarily use cyber threat activity to advance their geopolitical objectives. They are frequently the most sophisticated threat actors, with dedicated resources and personnel, and extensive planning and coordination.
47
Hacktivists
Carry out ideologically motivated cyber threat activity and are generally lower sophistication than state-sponsored cyber threat actors or organized cybercriminals. These actors, alongside terrorist groups and thrill-seekers, often rely on widely available tools that require little technical skill to deploy.
48
Shadow IT
The use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization. It can encompass cloud services, software, and hardware.
49
Evil twin vs rogue AP
A rogue AP is an illegitimate access point plugged into a network to create a bypass from outside into the legitimate network. By contrast, an evil twin is a copy of a legitimate access point.
50
Bluesnarfing attack
Happen when your Bluetooth is on and set on “discoverable to others” mode. To launch a Bluesnarfing attack, the attacker needs to exploit the object exchange protocol (OBEX protocol) to exchange information between the wireless devices
51
Bluejacking
Sends unsolicited messages to bluetooth-enabled devices
52
Automated indicator sharing
Enables the real-time exchange of machine-readable cyber threat indicators and defensive measures to help protect participants of the AIS community and ultimately reduce the prevalence of cyberattacks.
53
Structured Threat Information Expression
STIX is a language and serialization format used to exchange cyber threat intelligence (CTI)
54
Trusted Automated eXchange of Intelligence Information
TAXII is a collection of services and message exchanges to enable the sharing of information about cyber threats across product, service and organizational boundaries
55
Adversarial Tactics, Techniques, and Common Knowledge
MITRE ATT&CK is a guideline for classifying and describing cyberattacks and intrusions. It was created by the Mitre Corporation and released in 2013. The framework consists of 14 tactics categories consisting of "technical objectives" of an adversary
56
Threat (intelligence) feeds
Is an ongoing stream of data related to potential or current threats to an organization's security. TI feeds provide information on attacks, including zero-day attacks, malware, botnets and other security threats.
57
Intelligence fusion
A fusion center is an effective and efficient mechanism to exchange information and intelligence, maximize resources, streamline operations, and improve the ability to fight crime and terrorism by merging data from a variety of sources.
58
Common Vulnerability Scoring System (CVSS)
Is a method used to supply a qualitative measure of severity. CVSS is not a measure of risk. CVSS consists of three metric groups: Base, Temporal, and Environmental. The Base metrics produce a score ranging from 0 to 10, which can then be modified by scoring the Temporal and Environmental metrics.
59
Reconnaissance in pentesting
A discovery phase to gather information about available systems on the network and how they’re configured.
60
Vulnerability Assessment in pentesting
A comprehensive assessment which identifies misconfigured systems, outdated software, and other vulnerabilities that could be leveraged to compromise a system or the network.
61
Exploitation in pentesting
Vulnerabilities are reviewed and tested to determine if they can be exploited to gain unauthorized access, extract data, or move throughout the network.
62
Risk Determination in pentesting
An assessment of each verified vulnerability is performed to determine the likelihood of compromise and the potential impact on the organization.
63
White Box pentesting
Also known as clear-box, open-box, auxiliary and logic-driven testing. Penetration testers are given full access to source code, architecture documentation and so forth. The main challenge is sifting through the massive amount of data available to identify potential points of weakness, making it the most time-consuming type of penetration testing.
64
Black-box pentesting
The penetration tester is placed in the role of the average hacker, with no internal knowledge of the target system. Testers are not provided with any architecture diagrams or source code that is not publicly available. A black-box penetration test determines the vulnerabilities in a system that are exploitable from outside the network.
65
Gray-box pentesting
A gray-box tester has the access and knowledge levels of a user, potentially with elevated privileges on a system. Gray-box pentesters typically have some knowledge of a network’s internals, potentially including design and architecture documentation and an account internal to the network.
66
Rules of engagement in pentesting
ROE are meant to list out the specifics of your penetration testing project to ensure that both the client and the engineers working on a project know exactly what is being testing, when its being tested, and how its being tested.
67
Lateral movement in pentesting
Is a technique to progressively move through a network, after compromising an endpoint, to search for the key data and assets that are ultimately the target of an attack campaign.
68
Persistence in pentesting
Is a technique widely used by red teaming professionals and adversaries to maintain a connection with target systems after interruptions that can cut off their access
69
Pivoting in pentesting
Is the use of one infected computer to attack a different computer. This is done to avoid restrictions such as firewalls.
70
Wardriving
is locating and logging onto open wireless access points while driving down streets
71
Warflying
Is where a person uses a drone to detect unsecured wireless networks.
72
Footprinting
Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system - profiling an organization, gathering information about the host, network and people related to the organization.
73
Red vs Blue teams
Red Teams are offensive security focused. They simulate how a possible attacker would attack cybersecurity defenses. Blue Teams are defense focused. They architect and maintain the protective internal cybersecurity infrastructure.
74
Purple Teams
(Blue Red Teams) are both offensively and defensively minded and were designed to ensure holistic and synergistic operations and information exchange between attackers and company defenders. Typically purple teams aren’t really a team at all, rather a collaborative agreement between red and blue teams.
75
Black team
Is a phrase used to describe a physical penetration test.
76
White team
Is responsible for refereeing an engagement between a Red Team (attackers) and a Blue Team (defenders) in an enterprise set up with information and systems. The white team acts as a judge by enforcing rules during the exercise and scoring the other groups. Besides, the team ensures that the activities of Red and Blue Teams run fairly without causing operational problems.
77
SPIM
Spam over IM
78
Dumpster driving
Entails threat actors to search through a victim's trash
79
Social Engineering Principles
Authority, Intimidation - intimidate a victim by trying to appear superior Consensus / Social Proof - convinces victims they can be trusted Scarcity - false urgency Familiarity/Liking, trust - use charisma or likeability to get a victim to complete a request
80
Potentially unwanted programs (PUPs)
A PUP serves as a marketing tool and often modifies browser settings or displays unwanted advertisements. The most common form of PUP is adware.
81
Fileless virus
Is malicious code that works directly within a computer's memory instead of the hard drive. It uses legitimate, otherwise benevolent programs to compromise your computer instead of malicious files.
82
Command and Control attack
Attack that involves tools to communicate with and control an infected machine or network. To profit for as long as possible from a malware attack, a hacker needs a covert channel or backdoor
83
Logic bombs
A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious.
84
API attacks
Malicious usage of an API from automated threats such as access violations, bot attacks or abuse.
85
Pass-the-Hash (PtH) attack
A technique where an attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access to other networked systems.
86
Initialization vector in WEP
It performs an integrity check to ensure that packets are not modified in transit. For this, it uses a 24-bit IV. The IV is included in the packet in the cleartext part of a message. Its goal is to ensure that two ciphertexts are not encrypted with the same key stream.
87
Maneuver (Threat hunting)
How to think like a malicious user to help you identify potential indicators of compromise in your environment.