1.0 - Threats, Attacks and Vulnerabilities Flashcards

1
Q

What is phishing?

A

Social engineering with a touch of spoofing. This is used to collect access credentials.

  • often delivered by email, text, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is typosquatting?

A

A type of trick and misdirection. A type of URL hijacking - https://professormessor.com

prepending: https://pprofessormesser.com

real address:

https://professormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is pretexting?

A

A type of trick and misdirection. Lying to get information

The attacker is a character in a situation that they create

example - “Hi, we’re calling from visa regarding an automated payment to your utility service…”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming?

A

Redirection to a legit website to a bogus site that harvests a large group of people (as opposed to an attack directed at a single person). This poisons the DNS server and/or client vulnerabilities.

This typically appears very legitimate and is hard to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is vishing?

A

(voice phishing) is done over the phone or voicemail

  • caller ID spoofing is common
  • fake security checks or bank updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is smishing?

A

(SMS phishing) is done by text essage

  • spoofing is a problem here as well
  • forward links or asks for personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is reconnaissance?

A

Gathering information on a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is spear phishing?

A

Targeted phishing with inside information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is whaling?

A

Spear phishing the CEO. A targeted phishing with the possibility of a large catch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the pretext?

A

Simply a lie that sets up the scenario for a specific attack. The “trap.”

“Hello sir, my name is Wendy and I’m from Microsoft Windows. This is an urgent check up call for your computer as we have found several problems with it.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is impersonation?

A

Attacker who pretends to be someone they are not. They use the details they gather during reconnaissance. They commonly attack the victim by acting as someone of higher rank and throw around tons of technical details around to confuse the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is eliciting information?

A

Extracting information from the victim. Usually the victim doesn’t even know this is happening. Often seen with vishing. These are well documented psychological tricks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is identity fraud?

A

Your identity being used by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is dumpster diving?

A

A mobile garbage bin. People will look through thrown out trash to gather information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is shoulder surfing?

A

Quite simply, looking over your shoulder to access your important information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are hoaxes?

A

A threat that doesn’t actually exist but they seem like they COULD be real

This is often an email

17
Q

What is a watering hole attack?

A

This attack relies on the idea of infecting you by use of a third party. This third party is the “watering hole” which is the central place where they’re hoping users will come and take a drink.

18
Q

What is the difference between pharming and a water hole attack?

A

Pharming = fake site

Watering hole = compromised site frequented by your target/s.

19
Q

What is spam?

A

Unsolicited messages

20
Q

What is SPIM?

A

Spam over Instant Messaging

21
Q

What is a strategy for blocking and/or preventing spam?

A

Spam filter - Have it filtered at the mail gateway before it goes to your server

22
Q

How does the mail gateway filter spam?

A
  1. Create an “allowed list” which will only receive email from trusted senders
  2. Most spam is not compliant with SMTP standards so your filter can block anything that is not adhering to these
  3. rDNS (Reverse DNS) - block emails where the sender’s domain doesn’t match the IP address
  4. Tarpitting - intentionally slow down the server conversation (they may elect to skip over you to avoid the slowdown)
  5. Recipient filtering - block all email not addressed to a valid recipient email address
23
Q

What is an Influence Campaign?

A

Sway public opinion on political and social issues

24
Q

What is an example of a influence campaign?

A

Hybrid Warfare

This is a military strategy. By using the internet to “wage war.” This is often referred to as cyberwarfare.

*** Military’s that use these can influence election or convince people of “fake news”

25
Q

What is tailgating?

A

Use an authorized person to gain unauthorized access to a building

26
Q

What is an invoice scam?

A

Start with a bit of spear phishing (will find out who pays the invoices in your organization) and then will send a fake invoice (bill of some sort) this bill is often spoofed version from someone of authority that looks legitimate

27
Q

What is credential harvesting?

A

When hackers try to gain access to your username and passwords stored on your local computer. This is utilized by harvesting the stored credentials on your browser. The bad guys will often send an email that has an attachment that when opens runs a macro that downloads the harvesting malware.

*** This is also known as password harvesting

28
Q
A