1.0 Threats, Attacks and Vulnerabilites Flashcards

1
Q

Phishing

A

A broad term used to describe the fraudulent acquisition of information like credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

Phishing via SMS or text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

Phishing via the physical phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

This is a social engineering technique used to get users to open a message in an email/text to exploit malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spam over instant messaging (SPIM)

A

This is spam that happens over email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

Phishing while focusing on a particular group of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster Diving

A

This is where people retrieve information by looking for it in the trash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder Surfing

A

This is a technique used by gaining credentials by looking over someones shoulder in order to retrieve their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

This redirects traffic away from legitimate websites to malicious versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A

This is a physical entry attack while following behind someone to gain access to a building/room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting Information

A

a technique used to gather information without targets realizing they are providing it; examples of this include flattery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

This is phishing a specific person in an organization that is either an admin or someone high up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A
  1. Adding in a phrase such as safe to a set of email headers to attempt to fool someone into thinking the email is indeed safe.
  2. Adding information as part of another attack to manipulate the outcome
  3. Suggesting topics via a social engineering conversation to lead toward related information the social engineer is looking for.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Fraud

A

This is the use of someone else’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A

This involves sending fake invoices to organizations in the hopes of receiving payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential harvesting

A

This is the process of gathering credentials like usernames and passwords. Multifactor authentication is a great way to stop credential harvesting from continuing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reconnaissance

A

This is the gathering of information about a target, whether it is an organization, individual or something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hoax

A

These are intentional falsehoods that come in a variety of forms such as virus hoaxes to fake news.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Impersonation

A

A person acting like someone they are not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Watering Hole Attack

A

This uses websites that targets use to attack the victim, the attackers can compromise the site that the victims are using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Typosquatting

A

Attackers using similar legit URL’s to direct victims to the attackers fake URL that houses malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

pretexting

A

This is the process of using a made-up scenario to justify why you are approaching an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Influence Campaigns

A

Individuals and organizations conduct influence campaigns to turn public opinion in directions of their choosing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Principles

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Ransomware

A

This is malware that takes over a computer and then demands ransom such as money.

26
Q

Trojan

A

This is a type of malware that is typically disguised as legitimate software.

27
Q

Worms

A

These are a form of malware that spreads throughout systems via email attachments, file shares etc.

28
Q

Potentially unwanted programs (PUP’s)

A

These are programs that may not be wanted by the user but are not as dangerous as other types of malware. These are typically installed without the users awareness or as part of a software bundle.

29
Q

Fileless virus

A

This is a virus that acts the same as traditional viruses. They spread like spam email and malicious websites but at no point do they require local file storage.

30
Q

Command and Control

A

These systems operate in a client-server mode. They will contact central control systems, which provide commands and updates, and track how many systems are in the botnet.

31
Q

Bots

A

Remotely controlled systems or devices that have a malware infection

32
Q

Cryptomalware

A

This encrypts files and then holds them hostage until a ransom is paid.

33
Q

Logic Bombs

A

These are functions or code that is placed inside other programs that will activate when set conditions are met.

34
Q

Spyware

A

This is malware that is designed to obtain information about an individual, organization or system

35
Q

keyloggers

A

These are programs that capture keystrokes from keyboards or other things like mouse movement, touchscreen inputs or credit card swipes from attached devices.

36
Q

Remote access Trojan (RAT)

A

This provides attackers with remote access to systems.

37
Q

Rootkit

A

This is malware that is specifically designed to allow attackers to access a system through a backdoor.

38
Q

Backdoor

A

These are methods or tools that provide access that bypasses normal authenitcation and authorization procedures, allowing attackers access to systems, devices or applications.

39
Q

Spraying

A

This is a form of brute force attack that attempts to use a single password or small set of passwords against many accounts

40
Q

Dictionary Attack

A

This is an attack that uses a list of words for their attempts. John the ripper is a popular open source password cracker.

41
Q

Brute Force Attack

A

This iterates through passwords until the attack finds the one that works

42
Q

Rainbow Table

A

This is an easily searchable database of precomputed hashes using the same hashing method as the captured password file.

43
Q

Plaintext/unencrypted attack

A

This is when a password or other credentials are stored as plaintext and not in a hash value making it much easier for an attacker to find.

44
Q

Malicious Universal

A
45
Q

Serial Bus (USB) Cable

A

This is a usb cable that is compromised and can go undetected from a victims standpoint.

46
Q

Malicious flash drive

A

Pen testers/attackers use this to drop drives in locations where they may be picked up and plugged in by unwitting victims

47
Q

Card cloning

A

This focuses on capturing information from cards like RFID and magnetic stripe cards often used for entry access.

48
Q

Skimming

A

This uses hidden or fake readers to capture cards, and then employ cloning tools to use credit cards and entry access cards for their own purposes.

49
Q

Adversarial artificial intelligence (AI)

A

This is where AI is used by attackers for malicious purposes. The focus of this currently tends to deal with data poisoning

50
Q

Supply chain attacks

A

Attempt to compromise devices, systems or software before it even reaches the organization.

51
Q

Cryptographic Attacks

A
52
Q

Birthday Attack

A

An attempt to find collisions in hash functions

53
Q

Collision attack

A
54
Q

Downgrade attack

A

This is used against secure communications such as TLS in an attempt to get the user or system to inadvertently shift to less secure cryptographic modes which may be easier to break.

55
Q

Authority

A

This relies on the fact that most people will obey someone who appears to be in charge or knowledgable

56
Q

Intimidation

A

Relies on scaring or bullying someone into making a decision

57
Q

Consensus

A

Uses the fact that people tend to want to do what others are doing to persuade them to take an action

58
Q

Scarcity

A

Used in scenarios that make something look more desirable because it may be the last one available

59
Q

Familiarity

A

This is based on liking the individual or organization

60
Q

Trust

A

This relies on connection with the individual they are targeting

61
Q

Urgency

A

Relies on creating a feeling that the action must be taken quickly due to some reason

62
Q

Cryptographic salts

A

A salt is random data that is used as an additional input to a hash password