Security + NET ATTACKS Flashcards

network attacks

1
Q

bluejacking

A

**involves sending unsolicited messages **to Bluetooth-enabled devices, such as laptops, mobile phones, or PDAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bluesnarfing

A

the unauthorized access of information from a wireless device through a Bluetooth connection,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

cyberattack that uses the phone to trick people into sharing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(SPIM) Spam Over Instant Messaging

A

Spam that is sent through instant messaging, SMS, or private messages on websites.

(intrusive ads, spyware, or viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smishing

A

phishing scam that uses text messages to trick people into sharing personal or financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic attack

A

a malicious attempt to exploit a weakness in a cryptographic system and gain unauthorized access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Downgrade attack

A

take advantage of a system’s backward compatibility to force it into less secure modes of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deauthentication attack

A

type of denial-of-service (DoS) attack that disrupts the connection between a wireless device and its Wi-Fi access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial-of-Service

A

attack that aims to disrupt, disable, or shut down a network, website, or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute-force attack

A

a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

` involves disguising information to trick people into believing they are interacting with a trusted source`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replay attacks

A

eavesdropping on network traffic, capturing legitimate communication packets, and then replaying them to the target devic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Eavesdropping

A

used by cyberattackers to intercept communication and steal sensitive data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data interception

A

a type of data theft that involves the unauthorized redirection of information intended for one party to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

on-path attack

A

cyberattack where a malicious actor secretly positions themselves between two devices to intercept or modify communications between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP poisoning

A

cyber attack carried out over a Local Area Network (LAN) that

  • involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS poisoning (Domain Name System )

A

happens when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website

17
Q

Media Access Control (MAC) flooding

A

is a network attack that compromises the security of a network **SWITCH** by overflowing its memory used to store the MAC address table.

18
Q

MAC spoofing

A

a technique for **changing **a factory-assigned Media Access Control (MAC) address of a network interface on a networked device

19
Q

MAC cloning

A

changing or impersonating the MAC address of a network interface card to match the MAC address of an authorized device on the network.

20
Q

Domain hijacking

A

refers to a situation in which domain registrants due to unlawful actions of third parties lose control over their domain names.

21
Q

URL hijacking

A

attackers* take advantage of common typos or misspellings* that users make when typing in the URL of a legitimate site.

22
Q

Pharming

A

cyberattack that redirects a user’s browser to a fake website without their knowledge or consent

23
Q

Typosquatting

A

** involves registering a domain name** that is similar to a legitimate website's but with an intentional typo

24
Directory traversal attacks
a **vulnerability **in a web application server caused by a **HTTP exploit**. `The exploit allows an attacker to access restricted directories, execute commands,` For example, if a website downloads a PDF to a user's computer using the URL https://www.vulnerable.com/download_file.php?file=document.pdf, the attacker can pass in the file name ../../etc/passwd.
25
OT DDoS attack
designed to exploit the systems that are directly on the plant floor.
26
Rogue access point
***a wireless access point ***`that is installed on a network without the network owner's permission`
27
Disassociation (WiFi)
a normal part of the communication protocol, ***used to cleanly break the connection***` between a device and the network.`
28
Jamming (WiFi)
create traffic jams for the radio transmitter so that real traffic cannot get through,
29
Radio frequency identifier (RFID) _ WiFi
a wireless technology that uses radio waves to communicate information between tags and readers
30
Near field communication (NFC)
a set of wireless technologies that allow two devices to communicate with each other when they are within a few centimeters of each other.
31
Initialization vector (IV)
used to **prevent unauthorized decryption** of the `message by a suspicious or malicious actor.`
32
Man in the middle
attacker **secretly intercepts and relays messages** `between two parties who believe they are communicating directly with each other.`
33
Man in the browser
The ***Man-in-the-Browser*** attack is similar to the Man-in-the-Middle attack, `except the interception is done at the application layer by exploiting browser vulnerabilities.`
34
locator (URL) redirection
is a `vulnerability` **which allows an attacker to**``` ** force users of your application to an untrusted external site. **``` The attack is most often performed by delivering a link to the victim,
35
Domain reputation
**a measure that Internet Service Providers (ISPs)** `use to determine whether your emails can be trusted or not`.
36
-PowerShell
a tool for task automation and configuration management that combines a command line shell with a scripting language.
37
- Python
an interpreted, object-oriented, high-level programming language with dynamic semantics
38
- Bash
provides a way to interact with Unix-based operating systems. It allows users to execute commands, perform complex operations,
39
- Macros
** malicious software.** This type of malicious software is called macro-based malware and it `exploits the automatic execution feature of macros to run harmful code without the user's knowledge`
40
- Virtual Basic for Applications (VBA)
a programming language that allows users to extend Microsoft Office applications like Excel, PowerPoint, and Word