Types of Attacks - Technical Flashcards
(35 cards)
Attacker exploits know vulnerabilities in specific app or OS or attack features in specific protocols or services in an attempt to deny authorized users access to an info system or features of that Info system.
Denial of Service (DoS)
A DoS carried out using multiple attack system.
Distributed Denial of Service (DDoS)
DDoS type of attacks can be made up of compromised systems that are unwitting participants in an attack
Zombie Attack
Comprised of capturing traffic between two hosts. The attacker can observe traffic before relaying it. To the sending system it appears that all communication is occurring normally since all expected replies are received.
Man-in-the-Middle (MITM)
Input buffer used to hold input is overwritten with data that is larger than the buffer can handle and happens due to error-checking not present in the way the application is written, whether it be due to poor coding practices or limitations of the programming language used.
Buffer Overflow
Input from users is not validated against expected results and allows attackers to obtain command-line access at the privileged level of the application.
Injections
Takes advantage of user input not being validated properly and is one of the most common web attacks. If the input is not validated properly, an attacker can include their script in their input and have it rendered as part of the web process.
Cross-Site Scripting (XSS)
XSS TYPE
Injected script is not stored but immediately executed and passed back via the web server.
Non-persistent XSS attacks.
XSS TYPE
Script is permanently stored on the web server or on some back-end storage system and allows the attacker to continue log the script against those who log into the system.
Persistent XSS attacks.
XSS TYPE
Script is executed in the browser via the DOM process as opposed to on the web server
DOM-based XSS attack
XSS ATTACK
Theft of authentication
Web apps
XSS Attack
Session
Hijacking
XSS Attack
Deploy hostile
Content
XSS Attack
Change user
Settings
XSS Attack
Impersonate
Users
XSS Attack
Phishing or stealing
Sensitive Information
Attacker utilizes authorized activity to be performed outside authorized use against sites that have authenticated users - exploits the trust in previous authentication request.
Cross-Site Request Forgery (XSRF)
First step is to obtain root or admin level access and is called.
Privilege Escalation
Create a DoS and sufficient enough volume of packets to overwhelm a host such as a large server - more than one device is needed.
Amplification.
Attackers make unauthorized incorrect modifications to a DNS table of the host system.
DNS Poisoning
Act of changing the registration of a domain name without the permission of its registrants and spreads false domain locations via the DNS system
Domain Hijacking
Variant of MITM - installed piece of malware on a compromised system that “watches” user activity in their browser and when the user navigates to a certain site (such as a bank) the malware creates diff set of instructions - ie redirecting bill pay to transfer to attackers account
Man-in-the-Browser
Attack that takes advantage of a vulnerability that a software vendor is not aware of.
Zero Day
Attacker captures communication and replays it later to circumvent authentication mechanisms such as capturing and reusing certificates or tokens.
Replay attack