1.0 - Threats, Attacks, & Vulnerabilities Flashcards
Define
Typosqautting
A type of URL hijacking, using a misspelled version of a legitimate website URL
Define
Pharming
- Like phishing, but harvesting large groups of people
- Often utilizes a poisoned DNS server or client vulnerabilities
- Relatively rare, but they do occur
Define
Vishing
- Voice phishing, done over phone or voicemail
* Caller ID spoofing is common
Define
Smishing
- SMS phishing, performed via text message
* Caller ID spoofing is common
Define
Spear phishing
- Target phishing attacks, going after a very specific person or group.
- Utilize inside information, or public information gathered through reconnaissance, to make the attack more believable
Define
Whaling
- A spear phishing attack with a large target such as a CEO or CFO
- Typically for the purpose of getting funds from someone with access to a large bank account
Define
Dumpster Diving
• Gather personal details by going through trash, to use for phishing attacks and impersonation
How to Protect against Dumpster Diving?
- Shred or burn your documents
* Secure your garbage
Define
Shoulder Surfing
- Looking over someone’s shoulder to view private information, passwords, etc.
- Can be done from a distance using binoculars, telescopes, webcam monitoring
How to protect against Shoulder Surfing?
- Be aware of surroundings
- Use privacy filter (screen that blocks view from angles)
- Keep monitor facing away from windows, hallways
- Don’t do sensitive work in public area
Define
Watering Hole Attack
- When you can’t attack an organization directly, you can attack a third-party that is associated with them.
- The third party is termed the “watering hole.”
- Ex, hijack a website that the victim uses.
- The attack is looking for specific victims, but often all visitors of the watering hole are infected / attacked.
How to protect against a Watering Hole Attack?
- Make sure your own defenses are very good
* Use a multi-layered defense
Define
SPIM
Spam over Instant Messaging
Define
Spam
- Unsolicited messages, typically over email or on forums, etc.
- Can be malicious, but not necessarily so.
- Includes commercial advertising, non-commercial proselytizing, as well as malicious attacks like phishing
What are the problems caused by spam?
- Security concerns
- resource utilization
- storage costs
- management of spam
How to protect against spam?
- It is necessary to combine multiple approaches.
- Mail gateways / filters
- Utilize Allow lists
- SMTP standards checking (blocking anything not following RFC standards)
- rDNS check
- Tarpitting
- Recipient filtering
Define
Recipient Filtering
Blocking all email not addressed to a valid recipient
Define
rDNS
- Reverse DNS
* Confirms if a sender’s domain matches their IP address
Define
Tarpitting
- Intentionally slowing down server performance to slow down / mitigate an attack
- Ex. slow delivery of e-mail to prevent mass mailed spam, so the spammers move on from you
Define
Tailgating
- use an authorized person to gain unauthorized access to a building
- May involve social engineering such as walking with your hands full, posing as a 3rd party vendor, etc.
How to protect against tailgaiting?
- A no-tailgating policy
- Policy that all visitors must wear badges
- Mechanically prevent more than one person from entering at a time, such as a rotary, vestibule, airlock
What are some principles of social engineering?
- Authority
- Intimidation
- Scarcity
- Urgency
- Consensus / social proof
- Familiarity / Liking
- Trust
Define
Virus
- Malware that can reproduce itself
* Requires human interaction to execute
Define
Worm
A virus that can replicate and jump from machine to machine without requiring any human interaction
Describe some virus types
- Program virus: part of an application
- Boot sector virus: runs when booting system
- Script virus: can be operating-system or browser-based
- Macro virus: common in Microsoft Office
How to protect against ransomware?
- Always have a backup, ideally offline and disconnected
- Keep OS and applications up-to-date
- Keep anti-virus/malware signatures up-to-date
- Keep everything up-to-date
Difference between ransomware and crypto-malware?
- Ransomware may not necessarily encrypt your files, it can be any malware that requires payment to remove it
- Crypto-malware that encrypts your files is the most common form of ransomware today
- Therefore, ransomware is usually used exclusively to refer to crypto-malware
Define
Trojan horse
- Software that pretends to be something else
* Doesn’t really care much about replicating
Define
Fileless Virus
- Runs only in memory, saves nothing to system
- That makes it difficult to be detected
- Might modify the registry so it can run again after reboot
Examples of a PUP?
- Browser toolbar
- Backup utility that displays ads
- Browser search engine hijacker
Define
RAT
- Remote Access Trojan
- aka Remote Administration Tool
- A tool that gives administrative access to a remote user
How to protect against RATs?
- Don’t run unknown software
- Don’t follow unknown links
- Keep anti-virus/OS/applications up-to-date
- Always have a backup
Define
Rootkit
- Modifies core system files, becomes part of the kernel
- Can therefore be invisible to the OS; won’t be seen in task manager
- Thus invisible to traditional anti-virus utilities
- Very difficult to remove even if discovered, because it is now part of the operating system
How to protect against Rootkits?
- Use a remover that is specific to the rootkit; these are usually developed after a rootkit is discovered
- Use Secure Boot on UEFI
Define
Secure Boot
- A feature of UEFI
- Looks at the kernel, and will not boot a system that has been modified (or a system that does not support the Secure Boot feature)
Define
Bot
- Malware that infects a machine for purposes of automation.
- Receives instructions from a Command and Control server.
- May make your machine participate in attacks, etc.
Define
C&C
- Command and Control
* The server that controls bots / botnets
Define
Botnet
• A system of Bots working together
What are botnets often used for?
- DDoS attacks
- Relay spam
- Proxy network traffic
- Various distributed computing tasks
- That computing power may be rented out for sale (DDoS as a Service)
How to protect against bots?
- Prevent initial infection by keeping up-to-date, don’t download unknown things, etc.
- Network monitoring
- Use firewall to block C&C communications
Define
Logic Bomb
- Something left on a system that waits for a predefined event
- Can be triggered by a date/time, or by a user action, or system event, etc.
- Often destroys itself, making it difficult to gather evidence after attack
How to protect against Logic Bombs?
- Each is unique, so there are no predefined signatures; difficult to detect
- Process and procedures are a good strategy
- Formal change control; all modifications must be documented; undocumented changes trigger an investigation
- Monitoring that alerts on changes
- Host-based intrusion detection
- Applications like Tripwire
- Constant auditing
Define
Spraying Attack
- Trying a small number of very common passwords to log in to a multitude of accounts
- Avoids locking any accounts by only trying a few of the most common passwords before moving on
- No lockouts, no alarms, no alerts
Define
Brute Force Attack
- Try every possible password combination until the right one is matched
- Can take a very long time if a strong hashing algorithm is used
- Requires a large amount of processing power.
- When performed Online, it usually results in account lockouts.
Define
Offline Brute Force Attack
- When an attacker has obtained a hashed password, they can create hashes of guessed passwords and see if the hashes match. If they match, the attacker has guessed the password.
- Does not result in an account lockout or any alerts because the attack is not performed against the login system.
Define
Dictionary Attack
• Similar to brute force, but uses common words rather than every possible combination of characters
• Password crackers may utilize letter common substitutions
e.g., as in p@$$w0rd
• Still takes a very long time
Define
Rainbow Table
- An optimized, pre-built set of hashes
- Contains pre-calculated hash chains
- Allows you to compare password hashes without needing to do hash calculations of guessed passwords.
Define
Salt
- Random data added to a password when hashing
- Every user gets their own unique salt, so hashes are unique even if passwords are the same
- A type of cryptographic nonce
Where is a password’s Salt information stored?
• It is commonly stored with the password
What does the use of Salt protect against?
- It prevents the use of rainbow tables
- Does not stop a brute force, but slows it down.
- If an attacker acquires a hashed password, they would also need to know the salt in order to perform an Offline Brute Force attack.
Define:
Malicious USB Cable
- Looks like a normal USB cable / charger, but has additional electronics inside
- When a victim inserts it into a computer, it runs malicious software
Define:
Malicious USB flash drive
- Looks like a normal USB thumb drive / flash drive, but has additional electronics inside
- When a victim inserts it into a computer, it runs malicious software
- Attackers may leave flash drives on tables or on the ground, knowing curious people will plug them in to see what’s on them.
How do malicious USB cables / drives initiate malicious software?
- Auto-Run: Older operating systems would automatically run files on USB devices, but in modern systems, this is now disabled or removed by default.
- HID: The device can still act as an HID (Human Interface Device) and behave as a keyboard and/or mouse, allowing it to type pre-programmed input on your system, such as launching a command prompt and running commands.
- Files: The flash drive may simply contain malicious files and malware that, once interacted with by the user, will infect the system.
- Boot Device: If configured as a boot device, and a victim leaves it inserted when they reboot their computer, it may boot to the malicious USB which can then infect the computer.
- Wireless network adapter: Can connect the device to another network, redirect or modify internet traffic requests, act as a wireless gateway for other devices, etc.
Define
HID
- Human Interface Device
* Examples: Keyboard, Mouse
Define
Skimming
- Stealing credit card information, usually during a normal transaction
- Can either be skimmed from the card itself (the magnetic strip) or from the computer that it interacts with
Define
ATM Skimming
• An additional step of a Skimming attack, a small camera is added to the environment to record your PIN entry
Define:
Card Cloning
- Creating a duplicate of a credit card using information obtained from a skimmer.
- The cloned card can only be used for transactions using the magnetic stripe, as the chip can’t be cloned.
- Common for gift cards, which don’t utilize a chip.
Define
“Poisoning the training data”
- An attack on machine learning / AI
- Attackers send modified training data to confuse the AI / cause it to behave incorrectly
- AI is only as good as its training process
Define
Evasion Attack
- Finding limitations in an AI system in order to circumvent it
- Since AI is trained by specific criteria, it can be fooled if attackers change up their approach
How to protect against attacks on AI / machine learning?
- Check the training data to verify contents
- Constantly retrain with new data, more data, better data
- Train the AI to recognize potential poison data and evasion attacks
Define
Supply Chain
- All steps in the process from raw materials to end-user
* Includes raw materials, suppliers, manufacturers, distributors, customers, consumers
Define
Supply Chain Attack
- Attacking a target by going after another vendor in their supply chain
- Ex., if an HVAC vendor has VPN access to a target’s network, you attack the vendor to exploit that access
- Ex., you put malicious code or hardware into a device that is being sold down the supply chain
- One exploit can infect the entire chain
On-Premises vs. In-Cloud Security:
List PROS of ON PREM
- Full control of security
- Local on-site IT can manage more attentively
- System checks can occur at any time
- Don’t need to call outside team for support
On-Premises vs. In-Cloud Security:
List CONS of ON PREM
- A local team can be expensive and difficult to staff
* Security changes can take time. New equipment, configurations, and additional costs.
On-Premises vs. In-Cloud Security:
List PROS of IN-CLOUD
- Data is in a secure environment
- Strict physical access controls
- Automated security updates
- Fault-tolerance and redundancy lead to limited downtime, higher availability
- One-click deployments
On-Premises vs. In-Cloud Security:
List CONS of IN-CLOUD
- Third-parties may have access to your data
- Users must still be trained to follow security best-practices
- May not be as customizable
Define
Birthday Attack
- A type of Cryptographic Attack
- The attacker generates multiple versions of plaintext to try to match the hash of the target encrypted text
- i.e., try to find a collision through brute force
- Once matched, they can fake signatures, certificates, etc.
Define
Collision
• In Cryptography, a collision is when two different plaintexts have the same hash value
How to protect against a Birthday Attack?
Use a long hash output size
What is a Downgrade Attack?
- An attacker forces systems to downgrade their security to a form of encryption that is more vulnerable
- May be performed by influencing / intercepting the initial negotiation when encryption forms are determined
How to protect against Downgrade Attacks?
Do not allow a fallback to lower levels of encryption that are known to be vulnerable.
Define
Privilege Escalation
- Gaining higher level access to a system
- Either through exploiting a vulnerability, bug, or design flaw
- Typically used to access the root or admin account
Define
Horizontal Privilege Escalation
- Gaining access through one account to a different account
* Unlike normal privilege escalation, the access is not necessarily higher, just different
How to protect against Privilege Escalation?
- Ensure all systems are patched
- Keep AV software updated
- Utilize Data Execution Prevention
- Utilize Address space layout randomization
Define
Data Execution Prevention
- A safeguard on an operating system
- Only allows applications to run in certain areas of memory where that function is allowed.
- Allows only applications in executable areas to run
- If an attacker tries to run an application in the data section of memory, it is blocked
Define
Address Space Layout Randomization
- A safeguard on an operating system
- Randomizes where information is stored in memory
- If an attacker finds a way to take advantage of a memory address on one system, they will not be able to duplicate that on another system
- Prevents a buffer overrun at a known memory address
What are the legalities around Dumpster Diving?
- Varies in different countries
- In the US, it is LEGAL, not illegal, to go through someone else’s trash. Nobody owns trash.
- However, you cannot break the law in order to gain access to the trash (i.e. if it is on private property with No Trespassing signs)
Define
XSS
- Cross Site Scripting
- Name comes from its original association with browser security flaws.
- Info from one site could be shared with another.
- A common vulnerability with web-based applications.
- (Not to be confused with Cascading Styles Sheets / CSS)
Define
Non-Persistent XSS Attack
- If a website allows scripts to be run in user input (such as a search field), it is vulnerable for this type of attack.
- An attacker e-mails a link to the site, containing embedded input to run a script
- Once clicked, the site executes in the victim’s browser, as if it came from the server.
- The payload of the script is usually sent to the attacker, and may contain session IDs, credentials, etc.