1.0 Threats and Vulnerabilities Flashcards
Social engineering attack where the attacker views what the victim is typing by looking over the victims shoulder or passing by victims.
Shoulder Surfing
A social engineering attack that uses a lie or false story to lead one or more people to believe something is true that is very much not true.
Hoax
Type of social engineering attack that targets a group within an organization based on the patterns in a web page
Watering Hole Attack
A type of Social Engineering that takes advantage of two reactions most people have to authoritative sources, such as bosses, VIPs and so on. Fear and respect.
Authority
Can go hand in hand with authority, where a target can fell intimidated by someone that doesn’t have to be an authoritative figure.
Intimidation
When the attacker tried to be a bit more understanding and nicer to the victim to get whatever they need out of the target.
Consensus
Offering the victim or target something that they really want, specifically something that might be difficult to access or obtain.
Scarcity
When people respond to others who like them or take time to know the victim developing a bond with the victim so they can be better at persuading and influencing the victim to get what they want.
Familiarity
An attacker performs an action quickly to make it seem as if it is an urgent request to get what they need from the victim.
Urgency
this involves the MAC (Media Access Control) address of the data being faked.
ARP Poisoning
An attack method in which a daemon caches DNS reply packets, which sometimes contain other information (data used to fill the packets). The extra data can be scanned for information useful in a break-in or man-in-the-middle attack.
DNS Poisoning
Registering domains that are similar to those for a known entity but based on a misspelling or typographical error.
Domain Hijacking
Client side attack, initiated by the user by inadvertently running a Trojan Horse to grab communication between the client and the server, silently sending data the attacker wants to a third location.
Man-in-the Browser
An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection.
Replay Attack
Using multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page.
Clickjacking
The interception of a valid computer session to get authentication information or other sensitive data
Session Hijacking
Registering domains that are similar to those for a known entity but based on a misspelling or typographical error.
URL Hijacking
A small library that is created to intercept API calls transparently.
Shimming
Reprogramming a devices driver’s internals so that the device driver responds to all of the normal inputs and generates all the regular outputs but also generates malicious output.
Refactoring
An attack that changes the source MAC Address
MAC Spoofing
An attack that involves looking at repeated results in order to crack the WEP secret key.
IV Attack
An attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.
Evil Twin
Purposely obstructing or interfering with a signal.
Jamming