1.2 Flashcards
Most common network attacks are?
Reconnaissance attacks, access attacks, Denial of Service, Distributed Denial of Service attacks
What are reconnaissance attacks are trying to do?
Attempt to gather information about the victim before launching an attack, example use cdp, whois, ping sweeps etc.
Explain social engineering
In an attack that tries to use people to do thing or spill info
social engineering - phishing
a message with a link that goes to a dodgy site but looks legit
social engineering - spear phishing
targeted phishing attack for an person/organzation
social engineering - whaling
targeted emails for top execs
social engineering - pharming
used to direct a customers url from a valid resource to a malicious one that could be made to appear as the valid site to the user.
social engineering - smishing
attack through a text
social engineering - vishing
attack through phone
social engineering - baiting
leaving an infected device lying around
What is privilege escalation
process of taking some leve of access and achieving an even greater level of access to a router and then uses a brute-force attack against the router
What are back doors?
When attackers gain access to a system they usually want future access. a backdoor application can be installed to either allow future access or to collect information to use in further attacks.
How can backdoors be installed?
by users clicking something without realizing the link they click or the files they open is a threat. Can also be implemented as a result of a virus or worm.
6 types of access attacks
Password, Trust exploitation, port redrection, mitm, buffer overflow, ip, mac, dhcp spoofing
what is a convert channel?
effective mechanism for sending and receiving information data between machines without alerting any firewalls. Die Daten unter einem anderen Protokoll verkleiden.