Vulnerabilities And Attack Flashcards
What is a Vulnerability?
A weakness or flaw in hardware, software, configurations, or processes.
漏洞是指硬件、软件、配置或流程中的弱点或缺陷。
What can vulnerabilities lead to?
• Unauthorized Access
• Data Breaches
• System Disruptions
漏洞可能导致未授权访问、数据泄露或系统中断。
What is an Attack in cybersecurity?
A deliberate action by a threat actor to exploit vulnerabilities.
攻击是威胁行为者故意利用漏洞的行为。
What are common forms of attacks?
• Unauthorized Access
• Data Theft
• Malware Infections
• Denial-of-Service (DoS)
• Social Engineering
常见攻击形式包括:未授权访问、数据盗窃、恶意软件感染、拒绝服务攻击和社会工程学。
What are common hardware vulnerabilities?
• Firmware flaws
• End-of-life systems
• Missing patches
• Misconfigurations
常见硬件漏洞包括固件缺陷、生命周期结束设备、缺少补丁和配置错误。
How do you mitigate hardware vulnerabilities?
• Harden systems
• Apply patches
• Enforce baseline configurations
• Decommission outdated devices
• Isolate risky components
应对方法包括系统加固、打补丁、强制基线配置、退役旧设备和隔离高风险组件。
What are common Bluetooth attacks?
• Bluesnarfing
• Bluejacking
• Bluebugging
• Bluesmack
• BlueBorne
蓝牙攻击包括:蓝牙窃取、蓝牙骚扰、蓝牙劫持、蓝牙拒绝服务攻击和蓝牙空中传播。
What are common mobile vulnerabilities?
• Sideloading apps
• Jailbreaking / Rooting
• Insecure connections (e.g., public Wi-Fi)
常见的移动设备漏洞包括侧载应用、越狱/Root 和不安全连接。
How do you mitigate mobile vulnerabilities?
• Patch Management
• Use Mobile Device Management (MDM)
• Prevent sideloading
补救措施包括打补丁、使用移动设备管理系统、禁止侧载应用等。
What is a Zero-Day Vulnerability?
A newly discovered vulnerability with no patch or defense available.
零日漏洞是指尚未有补丁或防御措施的新发现漏洞。
What are common OS vulnerabilities?
• Unpatched systems
• Zero-days
• Misconfigurations
• Data exfiltration
• Malicious updates
操作系统漏洞包括:未打补丁、零日漏洞、配置错误、数据外泄和恶意更新。
How to protect an OS from vulnerabilities?
• Apply patches
• Use configuration management
• Use encryption
• Deploy endpoint protection and firewalls
• Use IPS and access controls
防护措施包括打补丁、配置管理、加密、端点防护、防火墙、IPS 和访问控制。
What is an SQL Injection attack?
It exploits database or web app vulnerabilities by inserting malicious SQL commands.
SQL 注入是通过插入恶意 SQL 语句来利用数据库或 Web 应用漏洞。
What is an XML Injection attack?
It targets the XML processing of web apps by injecting malicious XML structure or entities.
XML 注入是向 XML 数据中插入恶意内容,从而操控系统解析或盗取信息。
Bluetooth Vulnerability include:
1.insecure pairing
2.Device spoofing
3.On-path attacks
不安全配对
设备欺诈连接,假扮
路径攻击,在设备连接的过程中窃取信息
Best practice for secure Bluetooth usage
Turn off Bluetooth when not in use
Set non discoverable
Regularly update firmware
Only pair with known device
Use unique PIN
Use encryption for sensitive date
What is XSS (Cross-Site Scripting)?
Injecting malicious scripts into web pages to attack users.
中文:跨站脚本攻击(XSS)是把恶意脚本塞进网页里,害访问网页的人。
What is the goal of XSS attacks?
To steal data like cookies, hijack sessions, or redirect users.
中文:XSS攻击的目的是偷数据(比如Cookies)、劫持登录状态,或者把用户骗去假网站。
What is CSRF (Cross-Site Request Forgery)?
Tricking a user’s browser to send unauthorized actions without their knowledge.
中文:跨站请求伪造(CSRF)是骗你的浏览器,偷偷用你的身份发指令。
What is the goal of CSRF attacks?
To perform actions like changing passwords, transferring money, or posting without user consent.
中文:CSRF攻击的目的是改密码、转账、发帖,而且受害者自己都不知道。
What is a Buffer Overflow?
Writing too much data into a small memory space, causing crashes or allowing code execution.
中文:缓冲区溢出就是往内存小盒子里塞太多东西,导致程序崩溃或被黑客控制。
Why is Buffer Overflow dangerous?
Attackers can overwrite memory and make the system run their malicious code.
中文:黑客可以趁溢出来改掉内存里的指令,让电脑执行恶意程序。
What is a Race Condition?
When two operations happen at the same time and mess up shared resources.
中文:竞态条件就是两个动作抢着操作同一个资源,结果搞出混乱。
Why are Race Conditions dangerous?
Attackers can exploit timing issues to bypass security checks or steal data.
中文:黑客可以利用时机差错,绕过安全检查,或者偷走重要数据。