Section 1 – Attacks, Threats, and Vulnerabilities Flashcards
Typosquatting
Also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser
URL hijacking
Targeting people on the internet who incorrectly type a website’s domain name in the browser.
Scammers register domain names that may seem similar to the original brand name, except there is a small typo in the domain that can be easily missed.
Prepending
When an attacker prepends, or attaches, a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order to make the message appear more trustworthy.
Pretexting
Is a form of social engineering in which an attacker gets access to information, a system or a service through deceptive means. The attacker will present a false scenario — or pretext — to gain the victim’s trust
Pharming
redirects internet users to fake websites to steal user data. It’s generally carried out by using one of the following techniques: Malware, DNS cache poisoning, Host file modification, Rogue DNS servers
Vishing
Is short for “voice phishing,” which involves defrauding people over the phone, enticing them to divulge sensitive information. In this definition of vishing, the attacker attempts to grab the victim’s data and use it for their own benefit
Smishing
Is a form of phishing, which uses social engineering to trick someone into revealing private information. However, the attack is executed using a text message.
Reconnaissance
Gather information on the victim
Spear phishing, whaling
Is a strategic phishing attack, targeted towards high profile executives, that is disguised as a permitted email. An attacker can prod the target for information that helps them access sensitive areas of the network, passwords, or other user information.
Impersonation
Is a type of targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data from unsuspecting employees using social engineering tactics.
Hoaxes
Is a fake warning about a virus or other piece of malicious code. Typically a hoax takes the form of an e-mail or other message warning the reader of a dangerous new virus and suggesting that the reader pass the message on.
Hoaxes cause no damage in themselves, but their distribution by well-meaning people often causes fear and uncertainty.
Watering hole attack
Is a form of cyberattack that targets groups of users by infecting websites that they commonly visit.
Watering hole attacks are relatively rare, but they continue to have a high success rate. That is because they target legitimate websites that cannot be blacklisted, and cyber criminals deploy zero-day exploits that antivirus detectors and scanners will not pick up.
Malware types
Virus, Crypto, Ransomware, Worms, Trojan Horse, Rootkit, Keyloggers, Adware/Spyware, Botnet
Trojan Horse
SW pretends to be something else
Rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
Worms
Uses the network as a transmission media, replicates by itself.
Virus vs Worm?
Virus needs to be executed, Worm replicates automatically
Spraying attack
brute force logins based on list of usernames with default passwords on the application. An attacker will use one password against many different accounts on the application to avoid account lockouts
Rainbow table
tables of reversed hashes used to crack password hashes
Password salting
technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them
Skimming
Skimming occurs when devices illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps capture data or record cardholders’ PINs.
Birthday attack
Type of brute force attack. Is a form of cryptographic attack that cracks mathematical algorithms by looking for matches in the hash function. The strategy relies upon the birthday paradox.
Downgrade attack
is an attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version.
Collision (hash)
When two inputs producing the same hash value