1.0 Threats, Attacks, and Vulnerabilities Flashcards
Social engineering technique that is tricking users using Email or websites into revealing personal or confidential Information.
Phishing
Social Engineering technique that is sending fraudulent text messages to users to reveal personal or confidential information
Smishing
Social Engineering technique that is calling the user to reveal personal or confidential information
Vishing
This is a unwanted solicited bulk messages that is being through the email, IM, SMS.
Spam
a spam message that is being delivered through instant messaging instead of email is called?
SPIM Spam over instant messaging
social engineering technique that only targets a specific person or group and often will include information known to be of interest to the target, such as current events or financial documents.
Spear Phishing
the process of investigating an individual or organization’s trash to retrieve information that could be used to compromise network resources or plan a cyberattack.
Dumpster Diving
using direct observation techniques, such as looking over someone’s shoulder, to get information.
Shoulder Surfing
a malicious attack on a server or user’s computer in which an unauthorized party substitutes the site of a legitimate web server with its own
Pharming
a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises
Tailgating
strategic use of casual conversation to extract information from people (targets) without giving them the feeling that they are being interrogated or pressed for the information
eliciting information
Social Engineering that is a highly targeted phishing attack - aimed at senior executives - masquerading as a legitimate email.
Whaling
Adding certain keywords to the email subject line such as URGENT or RESPONSE REQUIRED which will make the user read the email and to initiate some type action in the email thread.
Prepending
Method of gathering usernames and passwords in masses suchas, via email phishing, and other exploits
Credential Harvesting
The practice of covertly discovering and collecting information about a system.
Reconnaissance
These can take the form of false virus alerts chain letters, or attempts to spread false information about some issue (such as warnings that the Federal Government is about to tax e-mail).
Hoax
a type of phishing attack where the attacker impersonates a legitimate sender in order to trick the recipient into clicking on a malicious link or attachment.
Impersonation
attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user’s computer and gain access to the network at the target’s workplace.
Watering Hole Attack
a form of cybersquatting targeting people that accidentally mistype a website address directly into their web browser URL field.
TypoSquatting
a made-up scenario developed by threat actors for the purpose of stealing a victim’s personal data
Pretexting
Hybrid vishing takes these scams a step further. Cybercriminals first reach out to victims through email. However, unlike traditional email-based phishing, they won’t present a malicious link within the message. Instead, they’ll list a number for targets to call, leading them into a vishing scam
What type of war is this called?
Hybrid Warfare
A social engineering technique is the person who’s trying to gain access so they’re going to pretend that they have some type of authority that allows them access to this information
Authority
Social engineering technique that might say that bad things will happen if you don’t help. Or it could be something as simple as saying, the payroll checks aren’t going to go out unless I get this information from you.
Intimidation
Social engineering technique that is using other people and what they’ve done to try to justify what they’re doing. They might tell you that your coworker was able to provide this information last week. They’re not in the office now so it’s something that maybe you could provide for them
Consensus
Social engineering technique that uses a particular situation is only going to be this way for a certain amount of time, we have to be able to resolve this issue before this timer expires.
Scarcity
Social engineering technique where they become your friend. They talk about things that you like, and by doing that, they make you familiar with them on the phone and make you want to do things for them.
Familiarity
Social engineering technique where they are going to try to create trust between you and him. He’s going to try to tell you that he’s going to be able to solve all of your problems. He’s going to be able to fix all of these issues. You just need to trust him and provide the information he’s asking for
Trust
social engineering can inject some type of urgency, then they can make things move even faster. This needs to happen quickly. Don’t even think about it. Just provide this information right now so that we can solve this problem
Urgency
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
a type of malware that disguises itself as legitimate code or software.
Trojan
a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
Worm
software that’s bundled into download packages and offers no benefits for users. usually viewed as unwanted programs, because they offer few or no benefits and can serve as adware or spyware.
PUP - Potentially unwanted programs
malicious code that works directly within a computer’s memory instead of the hard drive. It uses legitimate, otherwise benevolent programs to compromise your computer instead of malicious files.
Fileless malware
Server is a computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network
establishment of outbound communication from a victim system for secure communication between victim and adversary systems.
Command and control
can be programmed/hacked to break into user accounts, scan the internet for contact information, to send spam, or perform other harmful acts
Bots
a form of malware that enables a threat actor to carry out cryptojacking activity
Crypto Malware
a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects
Logic Bomb
any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
Spyware
Malware designed to allow an attacker to remotely control an infected computer. Once the tool is running on a compromised system, the attacker can send commands to it and receive data back in response
NC at the start of the command is used
RAT Remote Access Trojan
set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkit
A type of brute force attack. In this attack, an attacker will brute force logins based on list of usernames with default passwords on the application
Spraying Attack
type of brute force attack that only uses the words with most possibilities of success are checked and are less time consuming than brute force
Dictionary Attack
the attacker has access to the encrypted material or a password hash and tries different key without the risk of discovery or interference
What type of brute force attack is this?
Brute Force Offline
The attacker needs to interact with a targeted system to access encrypted material or a password hash and tries different key with the risk of discovery or interference.
What type of brute force attack is this?
Brute Force Online
a password cracking method that uses a special table to crack the password hashes in a database
Rainbow table
a scenario in which the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Plaintext/unencrypted
anyone who plugs in the USB drives into their devices runs the risk of becoming victim of a “BadUSB” attack
Malicious USB
cable is any cable (electrical or optical) which performs an unexpected, and unwanted function
Malicious USB Cable
type of credit card theft in which the thief makes a digital copy of the credit card information using a concealed or disguised electronic scanner
Card Cloning
AI is used to manipulate or deceive another AI system maliciously
Adversarial artificial intelligence
technique involves an attacker inserting corrupt data in the training dataset to compromise a target machine learning model during training
Tainted Machine Learning or Data Poisoning
attacks are an emerging kind of threat that target software developers and suppliers. The goal is to access source codes, build processes, or update mechanisms by infecting legitimate apps to distribute malware.
Supply-Chain attacks
attack is a type of cryptographic attack, which exploits the mathematics behind the birthday problem in probability theory.
Birthday Attack
cryptographic hash function that is able to find a hash collision (a pair of different inputs that have the same hash) faster than by brute force
Collision Attack
a scenario in which a malicious actor attempts to force a server or client to use a lower version of a cryptographic protocol (such as TLS or SSL), a cipher suite (such as an export-grade cipher, instead of a standard one), or a connection type (HTTP, instead of HTTPS)
Downgrade Attack