1.2 Application/Service attacks Flashcards

1
Q

DoS(Denial of Service)

A

Flooding a target machine or resource with many requests to overload the system and prevent the use of its resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDos (distributed denial of service)

A

Flooding a target machine or resource with many requests to overload the system and prevent the use of its resources using multiple different sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Man in the middle

A

The attacker alters the communication between two parties who believe they are directly communicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Buffer Overflow

A

Program that attempts to write more data than can be held in a fixed block of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Injection

A

Occurs from processing invalid data, inserts code into the vulnerable computer program and changes the course of execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cross-site request forgery(XSRF)

A

Unauthorized commands are sent from a user that is trusted by a website. Allows the attacker to steal cookies and harvest passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Privilege escalation

A

An Attack that exploits a vulnerability that allows them to gain access to resources that they normally would be restricted from accessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP poisoning

A

the act of falsifying the IP to MAC address resolution system employed by TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cross-site Scripting (XXS)

A

found in web applications, allows for an attacker to inject client side scripts into webpages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Amplification

A

The amount of traffic sent by the atter is originally small but then is repeatedly multiplied to place a massive strain on the victim’s resources, in an attempt to cause it to fail or malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Poisoning

A

is a type of attack that exploits DNS vulnerabilities by diverting internet traffic away from a legitimate server and towards a fake one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain Hijacking

A

The act of changing the registration os a domain name without the permission of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Man in the browser

A

A proxy trojan that infects web browsers to capture browser session data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero day

A

Exploiting flaws or vulnerabilities that are undisclosed to the world, and therefore have no defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Replay

A

Network based attack where valid data transmission is rebroadcasted, repeated, or delayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Press the Hash

A

an authentication attack the captures the hash of a password, the attacker then attempts to log on as the user with the stolen hash. commonly associated with Microsoft NTLM (New Technology LAN Manager) Protocol

17
Q

Hijacking and related attacks

A

I. Clickjacking- overlay of malicious link over what appears to be a legitimate website
II. Session hijacking- an attack in which an attacker attempts to impersonate the user by using their legitimate session token
III. URL hijacking- Redirects the user to a false website based on misspelling the URL(AKA Typosquatting

18
Q

Driver Manipulation

A

I. Shimmering- the process of injecting alternate or compensation code into a system in order to alter its operations without changing the original or existing code
II. Refactoring- Rewrites the internal processing of code without changing its behavior