1.0 Attacks, Threats, and Vulnerabilities Flashcards
Social engineering with a touch of spoofing
Phishing
A type of URL hijacking where attackers register intentionally misspelled domain names similar to popular domain names
Typosquatting
Lying to get information. Adding a disclaimer or information text to the emails received from external domains
Pretexting
Social engineering attack that targets individuals in an organization
Spear Phishing
Social engineering attack that targets high-profiled individuals in an organization
Whaling
Redirect a legit website to a bogus site
Pharming
Voice phishing
Vishing
SMS phishing
Smishing
Gather information about the victim before phishing
Reconnaissance
Attacker pretends to be someone they are not
Impersonation
A threat that does not actually exist
Computer hoaxes
Infect third-party site that is visited
Watering Hole Attack
Having a layered defense
Defense-in-Depth
Unsolicited messages
Spam
Spam over Instant Messaging
SPIM
Intentionally slow down the server conversation
Tarpitting
Attacker collects login credentials
Credential Harvesting
What are these a principle of?
1. Authority
2. Intimidation
3. Consensus/Social Proof
4. Scarcity
5. Urgency
6. Familiarity/Liking
7. Trust
Social Engineering Principles
Malicious software
Malware
Malware that can reproduce itself but needs you to execute a program
Virus
Virus that is part of the application
Program Virus
Virus that infects the boot sector
Boot Sector Virus
Virus that is OS and browser-based
Script Virus
Virus that is common in Microsoft Office
Macros Virus
Virus that operates in memory inside RAM but is never installed in a file or application
Fileless Virus
Malware that self-replicates
Worm
Personal Identifiable Information
PII
Attacker wants your money
Ransomware
Malware encrypts your data files
Crypto-malware
Software that pretends to be something else
Trojan Horse
Undesirable software
PUP (Potentially Unwanted Program)
Malware that has a backdoor
RAT (Remote Access Trojan)
Modifies core system files and is part of the kernel which is invisible to the OS
Rootkits
Software that displays online advertisement to users
Adware
Malicious software that secretly collects and sends information about a person or organization to a third party
Spyware
Group of bots (malware-infected computers) working together and controlled by a single attacking party
Botnets
Malicious attack that makes online service, network resource, or host machine unavailable
DDoS (Distributed Denial of Service)
Malicious piece of code that is secretly inserted into a computer network, operating system, or software application and lies dormant until a specific condition occurs
Logic Bomb
Tries common passwords on multiple accounts a few times so that there are no lockouts, no alarms, and no alerts
Spraying Attack
Try every possible password until the hash is matched
Brute Force
Use dictionary to find common words and can substitute letters for numbers
Dictionary Attack
Optimzed, pre-built set of hashes
Rainbow Tables
Extra random data
Salt
Doesn’t need extra rights or permissions. Like a keyboard or a mouse
HID (Human Interface Device)
Stealing credit card info usually during a normal transaction
Skimming
Compuers that identify patterns in data and improve their predictions with training data
Machine Learning
Hash collision attack
Birthday Attack
form of hashing that had many hash collisions
MD5 (Message Digest Algorithm 5)
gain higher-level access to a system
TLS (Transport Layer Security)
encrypted link between web server and web browser
SSL (Secure Sockets Layer)
Gain higher level access
Privilege Escalation
Only data in executable areas can run
Data Execution Prevention
Takes advantage of trust a user has for a site
XSS (Cross-site Scripting)