1.0 Flashcards
Backdoor Testing
Backdoor testing refers to the process of evaluating a system or software application for the presence of hidden, undocumented, or unauthorized entry points known as “backdoors.” These backdoors can be intentionally or unintentionally created during development and may allow unauthorized access or control over the system.
Passive footprinting
A technique used in cybersecurity and ethical hacking to gather information about a target system, network, or organization without directly interacting with it. Passive footprinting relies on publicly available information and data sources, Learn as much as you can from open sources.
OS fingerprinting
A method used to identify the operating system running on a device in a network. It can be active, where specific packets are sent and responses analyzed, or passive, where network traffic is observed for OS characteristics. This information is valuable for network management, security assessments, and troubleshooting.
SOAR
Security Orchestration, Automation, and Response
A system designed to facilitate responses in incident response situations. Automate routine (Signitures), tedious, and time intensive activities.
Nation state
Often associated with advanced cyber capabilities and may engage in cyber espionage, cyber warfare, or other cyber activities for political, economic, or military purposes.
Governments
* National security, job security
* Always an external entity
DLL injection
Dynamic Link Library Injection
An attack that uses the injection of a DLL onto a system, altering the processing of a program by in essence recoding it.
Resource exhaustion
overloads the system’s resources and prevents legitimate users from accessing services on the target computer.
Wireless disassociation
Attacks against a wireless system are attacks designed to disassociate a host from the wireless access point and from the wireless network.
SIEM
Security Information and Event Management
Provides a centralized solution for collecting, analyzing, and managing data from multiple sources.
False negatives
Occurs when an IDS or IPS fails to send an alarm or alert even though an attack is active.
Credentialed
A type of security assessment or vulnerability scan that is conducted with privileged credentials, such as username and password combinations, to access and analyze the internal components of a system or network.
Non-credentialed
Also known as external scans or unauthenticated scans, are security assessments or vulnerability scans conducted without using specific credentials to access the internal components of a system or network.
DNS poisoning
Domain Name System poisoning
This is a type of attack where a DNS cache is manipulated to redirect domain name resolution to malicious IP addresses. The goal is to misdirect users to fake websites or servers controlled by attackers, leading to potential security breaches or data theft.
Prepending
When information is added to the beginning of malicious data. Ex. https://pprofessormesser.com
CSRF/XSRF
Cross-Site Request Forgery
An attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
SSL Stripping
Secure Sockets Layer Stripping
An attack where the hacker is able to place themselves between the victim and a secure HTTPS site that the victim uses. “stripping” https:// URLs and turning them into http:// URLs.
ARP poisoning
ARP poisoning, also known as ARP spoofing, is a type of cyber attack where the attacker targets the ARP cache of devices on a local network. In this attack, the attacker sends falsified ARP messages to associate their MAC address with the IP address of another device on the network, such as a router or a victim’s device. This can lead to traffic being redirected through the attacker’s device, allowing them to intercept, modify, or block network communication.
Macros
Automated sequences of commands or actions in software applications, often used for repetitive tasks or to automate complex processes.
Collision
When different inputs create the same hash, causing errors or data loss.
Watering Hole
A cyberattack strategy where attackers target websites frequently visited by a specific group of users, exploiting vulnerabilities in those sites to infect visitors with malware.
Typosquatting
A technique where attackers register domain names similar to popular ones, relying on users’ typographical errors to redirect them to malicious websites.
Pretexting
A social engineering tactic where attackers create a false pretext or scenario to trick individuals into revealing sensitive information or performing actions they wouldn’t usually do.
Session Replay
The unauthorized capturing and playback of user sessions (such as keystrokes, mouse clicks, and form entries) on websites or applications, often used for malicious purposes like stealing credentials.
Backdoor
A hidden or undocumented entry point in software or systems, allowing unauthorized access for maintenance or exploitation by attackers.
Rootkit
Malicious software designed to gain administrator-level control over a computer system while concealing its presence from detection by antivirus or security software.
Script Kiddies
Inexperienced or unskilled individuals who use pre-made scripts or tools to launch cyberattacks, often without fully understanding the underlying technology or risks.
APT (Advanced Persistent Threat)
A sophisticated and persistent cyberattack carried out by skilled and well-funded threat actors, usually targeting specific organizations or individuals over an extended period.
Threat Hunting
Proactive and continuous process of searching for and identifying potential security threats or anomalies within a network or system, aiming to detect and mitigate them before they cause harm.
Cross-site Scripting (XSS)
A type of web security vulnerability where attackers inject malicious scripts into web pages viewed by other users, allowing them to steal sensitive data or perform unauthorized actions.
Password Spraying
A brute-force attack method where attackers attempt to access multiple user accounts by trying a few commonly used passwords against many usernames, reducing the risk of account lockout.
XML Injection
A type of injection attack where attackers exploit vulnerabilities in XML input handling to manipulate XML data or execute malicious commands, potentially leading to data disclosure or system compromise.
Pharming
A cyberattack that redirects website traffic to a fake or malicious website, often achieved through DNS spoofing or manipulation to trick users into disclosing sensitive information.