1: 5 Common Attacks Flashcards
Hash Function
Maps data of an arbitrary size to a fixed-sized value
Brute Force Hash Analysis
Attacks the computer’s 1-way Hash Function through many input/output analysis to find vulnerabilities.
Where should hashes be stored?
Shadow Password File
Where shouldn’t hashes be stored
/etc/password File
Brute Force Attack
Guesses passwords by trying all possibilities
Dictionary Attack
Guesses passwords by using a list of all known words
Hybrid Attack
Guesses passwords by adding variations to known words
Rainbow Table Attacks
Guess passwords by precomputing common hashes
Password Spraying
Guesses passwords across multiple systems using a list of commonly used passwords
What is the best way to protect against password spraying?
Prohibit the use of common passwords
Credential Stuffing
Attacking by reusing the same username/password against multiple sites. This username/password can be obtained by initially targeting the weakest sites.
What is the best way to protect against credential stuffing?
Password manager tools and maintaining unique passwords
Multi-Factor Authentication
Electronic authentication method in which a device user is granted access to a website or application only after successfully presenting two or more pieces of evidence.
What are the three types of machine learning?
Descriptive analytics, predictive analytics, prescriptive analytics
Descriptive Analytics
Describes our data