Types of Attacks Flashcards

1
Q

What is an online attack?

A

They are trying to attack your creds directly onto the system. Repeatedly trying your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an offline attack?

A

Attacks involve compromising a service/account later on.

hacker get a download a database. on their own system to attempt later to login on an online server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a dictionary attack?

A

using a list of words or previously compromised passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a brute force attack?

A

trying every possible combination of password with a single account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is password spraying?

A

trying a single password against all possible accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are rainbow tables?

A

precomputing plaintext/hash pairs to form a lookup table that is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pass the hash?

A

Attacker grabs the actual hash that is being used and uses that instead of wasting time cracking the plain text password.

This was an issue with LM and NTLM in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is input validation?

A

Is a process of checking that the data that is being inputted is correct.
and if not, you cannot submit the info. Prevents the injection of malicious instructions

Example: when you are trying to submit a form and it tells you to fix a certain field before proceeding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is input Sanitization?

A

Is where you can fix the users mistakes. You are cleaning up their input.

Example. If a user puts a - or a space, you can clean up all those characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a buffer overflow?

A

A vulnerability in software coding that can be exploited by hackers to gain access to systems.

The data exceeds data space and it overflows into the important processes..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is memory buffer?

A

Is just a holding spot for data to be hold as it is transferred between location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a pointer/Object Dereferencing?

A

Refers to a memory address associated with some data. They “point to the data”

so the pointer references a specific data location in memory.

The hacker could point to a different data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a memory leak and Resource exhaustion.

A

When application don’t surrender memory space after they are done using it. The application memory consumption balloons over time.

It can cause resource exhaustion and therefor denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Structured Query Language (SQL) injection and what can attackers to do with it?

A

A code injection attack to attack data driven application. They insert input statements into fields for malicious purposes. Typically attacks against websites where inputs are needed.

1=1

Bypass security mechanisms (confidentiality)

Tamper with data ( integrity)

Cause downtime (availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you stop a SQL injection attack?

A

Input validation. Make sure to sanitize the info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cross site scripting (XSS)

A

Malicious code that is injected into web pages which then is executed on visitor’s local machine. For example: attacker sets a script under the comments field then others can read.

Usually done by JavaScript.

EX. Credentials taking / downloading malware / redirecting URL

17
Q

How do you sanitize a post to avoid XSS attacks?

A

Remove the < > brackets.

Also set up tokenization which means that for every single transaction and/or click on a site, a new token is needed to proceed.

18
Q

What are replay attacks?

A

When a message or a request is sent again (replayed)

19
Q

How can you stop Replay attacks?

A

Using one time session passwords,

implementing idle timeouts,

protecting session id with encryption.

20
Q

What is a path/directory traversal?

A

It is used to access data that is unintentionally exposed.

../../
%2e = an actual DOT
%2f = a /

21
Q

How is path/directory traversal mitigated?

A

By proper file system permissions.

Only people who have access to such directories should have access to them. Others should get denied.

22
Q

What is an API?

A

Application programming interface.

This allows users to program manage resources.

23
Q

What are examples of driver attacks?

A

Driver shimming: the placement of a driver between software components which allows communications to be intercepted.

Driver refactoring: the malicious modification of existing drivers

24
Q

How can you stop driver attacks?

A

Driver shimming: secure boot - checks all drivers and makes sure they are signed before running.

Driver Refactoring: download drivers from legit sites and confirming the HASH output.

25
Q

What is C2 or C+C?

A

Attacker sends instructions to a command and control server that then sends responses.

BEACONING is part of this type of attack.

26
Q

What is a botnet?

A

a collection of of bots who are acting in concert.

Bots may perform some actions like DoS, Spam email.

27
Q

What is on-path attack

A

Man in the middle attack.

May be used to
eavesdrop - confidentiality
interfere- availability
modify - integrity

28
Q

What is an example of on path attack?

A

ARP Spoofing.

ARP request = finds MAC address of device.

GARP - Gratutious ARP is when attacker sends a wrong mac info since switches only look at frames.

29
Q

How to prevent ARP Spoofing?

A

Set up on switches DAI - Dynamic Arp Inspections.

30
Q

What is DNS Spoofing?

A

Attacker compromised DNS entries on a DNS server.

31
Q

What are Script Kiddies?

A

Less Skill and knowledge, simply uses scripts. There are many of hackers under this category.

32
Q

What are Hactivist?

A

Hackers who attack organizations for political reasons.

33
Q

What are Organized Criminals?

A

Criminal hackers who typical seek financial gains.

34
Q

What are competitors?

A

Unethical businesses attempt attacks on competitors; competitors form certain countries more likely to engage.

35
Q

What are insiders?

A

Employees or ex employees who are now a potential threat.

36
Q

What are nation states / state actors?

A

Intelligence agencies, militaries, and dedicated cyber warfare organizations.

37
Q

What is a APT?

A

Advanced persistent threat is an ongoing series of sophisticated attacks; associated with nation states.

Typically Stealthy threat actors.