1.0 - Threats, Attacks, and Vulnerabilities Flashcards
1
Q
Phishing
A
- Mixture of social engineering and spoofing, often delivered by SPAM, IM, etc.
- try to convince you to provide personal information, SSN, Credit Card, Bank info, etc.
2
Q
Spear Phishing
A
- Direct their efforts toward a specific, narrow group of people
3
Q
Whaling
A
- Phishing that target high level individuals such as CEO’s, CIOs, VPs, etc.
4
Q
Vishing
A
- “Voice-Phishing”
- Phishing conducted over the phone
- Fake security checks or banks updates
5
Q
Replay Attack
A
- an attacker captures data sent between two entities, modifies it, and then attempts to impersonate one of the parties by replaying the data
- WPA using TKIP is vulnerable to replay attacks
6
Q
Downgrade Attack
A
- forces a system to downgrade its security
- attackers bypass a stronger security suite and exploit the weaker suite
7
Q
DoS
A
- an attack from a single source that attempts to disrupt the services provided by another system
8
Q
DDoS
A
- an attack from multiple sources that attempts to disrupt the services provided by another system
- typically include sustained, abnormally high network traffic
9
Q
Man-in-the-Middle
A
- an attackers accepts traffic from each party in a conversation and forwards the traffic between the two
- the two parties are unaware of the MITM and it can interrupt the traffic at will or insert malicious code
10
Q
ARP Poisoning
A
- attack that misleads computers or switches about the actual MAC address of a system
- ARP poisoning is sometimes used in MITM attacks
11
Q
Amplification
A
- attack that significantly increases the amount of traffic sent to, or request from, a victim
- can be used against a wide variety of systems, including individual hosts, DNS servers, and NTP servers
12
Q
Birthday Attack
A
- attacker is able to create a password that produces the same hash as the user’s actual password
- this is called a hash collision
13
Q
Replay Attack
A
- replay attacks capture data in a session with the intent to later impersonate one of the parties in the session
- an attacker captures data sent between two entities, modifies it, and then attempts to impersonate one of the parties by replaying the data
- WPA using TKIP is vulnerable to replay attacks
14
Q
Collision Attack
A
- collision attack occurs when the hashing algorithm creates the same hash from different passwords
15
Q
Dictionary Attack
A
- a dictionary attack uses a file of words and common passwords to guess a password