1.2 Compare and contrast different types of attacks Flashcards
Social Engineering
A means of getting users to reveal confidential information. (“Human Hacking”)
Phishing
A combination of social engineering and spoofing. An attacker sets up a spoof website to imitate a target bank or trusted source etc. The attacker emails users of the genuine site requiring a login. Their logon credentials are capture with the spoofed sit.
Spear Phishing
A phishing scam where the attacker has some information that makes an individual target more likely to be fooled.
Whaling
A spear phishing attack directed specifically against upper levels of management.
Vishing
Phishing attack conducted through a voice channel.
Tailgaiting
Entering a secure are by following close behind a person that has access.
Impersonation
Pretending to be someone else.
Dumpster Diving
Combing through an organization’s garbage to try to find useful documents.
Shoulder Surfing
Stealing a password or PIN by watching a user type it.
Hoax
An email alert or web pop-up will claim to have identified some sort of problem and offer a tool to fix it. The tool will be some sort of Trojan.
Watering Hole Attack
Relies on a group of targets using an unsecure third party website.
DoS
Denial of Service attack causes a service at a given host to fail or become unavailable. Ex. overloading a service by using up CPU, system RAM, disk space, or network bandwidth. The attack may be motivated by a desire to cause trouble. Or it may be a precursor to a MitM or data exfiltration attack.
Man-in-the-middle
An attacker sits between two communicating hosts, and transparently captures, monitors, and relays all communication between the hosts. MitM attacks can be defeated using mutual authentication, where both server and client exchange secure credentials.
Buffer Overflow
To exploit a buffer overflow vulnerability, the attacker passes data that deliberately overfills the buffer (an area of memory) that the app reserves to store the expected data.
Injection
The attacker embeds code within the input or appends code to it that executes when the server processed the submission