Video Concepts I Didnt Know Flashcards
https://youtu.be/9Hd8QJmZQUc?t=7549 (152 cards)
Pretexting
Social Engineering - an attacker tries to convincing a victim to give up information of value, or access to a system or service
Principals for Social Engineering Success
Authority
Intimidation
Consensus-based - someone else, a peer has done this
Scarcity - lack of time or availability of an item
Familiarity-based - establish a personal connection
Trust - citing knowledge/experience, or no payment to establish a relationship
Urgency - time sensitivity
XDR
Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response.
Worm
type of malware that spreads copies of itself from computer to computer, replicating itself without human interaction
Fileless Virus
type of malware that does not rely on virus laden files to infect a host. Instead it exploits applications that are commonly used for legitimate and justified activity to execute malicious code in resident memory
What is the most cost effective Ransomware countermeasure?
User Awareness Training
Password Spraying
Attacker tries a password against many different accounts to avoid lockouts that typically come when brute forcing a single account
Card Cloning
Focuses on capturing info from cards used for access, like RFID and magnetic stripe cards
Tainting training data for ML
Data poising that supplies AI and ML algorithms with adversarial data that serves the attackers purposes or attacks against privacy
Security of ML algorithms
Validate quality and security of data sources
Secure infrastructure and environment where AI and ML is hosted
Review, test and document changes to AI and ML algorithms
AI
(Artificial Intelligence) focuses on smart tasks combining ML and deep learning to emulate human intelligence
ML
(Machine Learning) a subset of AI, computer algorithms that improve automatically through experience and use of data
Deep Learning
Sub-field of machine learning concerned with algorithms inspired by the structure and function of the brain called artifical neural networks
Island Hopping Attack (Supply Chain)
Compromise a vulnerable vendor in an organization’s supply chain and then attempt to breach the target organization
What defeats a replay attack?
Date/time stamps
What attack can occur when a web app contains reflected input?
XSS (Cross site scripting)
What can techniques can defend against XSS attacks?
Input validation and filtering. Validate data length and data type
XSS
Cross Site Scripting
A type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
Occur when an attacker uses a web application to send malicious code to a different user
Client side vulnerability
on OWASP list
usually covered by default by WAF
XSRF / CSRF
similar to XSS, but exploits a different trust relationship; exploits trust that a user has in a website to execute code on the user’s computer
What technique(s) can be used to defend against XSRF attacks?
Create web apps that use secure tokens, and sites that check the referring URL in requests to ensure it came from local site, and not some external source
XML Injection
When users enter values that query XML (known as XPath) with values that take advantage of exploits, it is known as an XML injection attack.
XPath works in a similar manner to SQL, except that it does not have the same levels of access control,s so exploits can return entire documents
What technique(s) can be used to defend against SQL Injection attacks?
Input validation
Use prepared statements (stored procs)
Limit Account privileges (SQL has gradual permission on SQL dbs)
Deferencing
Taking away the reference and giving you what it was actually referring to
Time of Check Time of Use (TICTOU)
timing vulnerability that occurs when a program checks access permissions too far in advance of a resource request (race condition)