1.2 Compare and contrast different types of attacks Flashcards

1
Q

Social Engineering

A

A means of getting users to reveal confidential information. (“Human Hacking”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

A combination of social engineering and spoofing. An attacker sets up a spoof website to imitate a target bank or trusted source etc. The attacker emails users of the genuine site requiring a login. Their logon credentials are capture with the spoofed sit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear Phishing

A

A phishing scam where the attacker has some information that makes an individual target more likely to be fooled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

A spear phishing attack directed specifically against upper levels of management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Phishing attack conducted through a voice channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgaiting

A

Entering a secure are by following close behind a person that has access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impersonation

A

Pretending to be someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster Diving

A

Combing through an organization’s garbage to try to find useful documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shoulder Surfing

A

Stealing a password or PIN by watching a user type it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hoax

A

An email alert or web pop-up will claim to have identified some sort of problem and offer a tool to fix it. The tool will be some sort of Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Watering Hole Attack

A

Relies on a group of targets using an unsecure third party website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DoS

A

Denial of Service attack causes a service at a given host to fail or become unavailable. Ex. overloading a service by using up CPU, system RAM, disk space, or network bandwidth. The attack may be motivated by a desire to cause trouble. Or it may be a precursor to a MitM or data exfiltration attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Man-in-the-middle

A

An attacker sits between two communicating hosts, and transparently captures, monitors, and relays all communication between the hosts. MitM attacks can be defeated using mutual authentication, where both server and client exchange secure credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Buffer Overflow

A

To exploit a buffer overflow vulnerability, the attacker passes data that deliberately overfills the buffer (an area of memory) that the app reserves to store the expected data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Injection

A

The attacker embeds code within the input or appends code to it that executes when the server processed the submission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cross-site scripting

A

An input validation exploit. An attacker crafts a URL to perform code injection on a trusted site with an input validation vulnerability. When the user clicks the link, malicious code executes.

17
Q

ARP Poisoning

A

An attack that works by broadcasting unsolicited ARP reply packets. Because ARP in an antiquated protocol with no security. The receiving devices trust this communication and update their MAC:IP address cache table with the spoofed address.

The attacker’s spoof MAC address will receive all messages directed at the legitimate user. MiTM attack.

18
Q

Amplification

A

An adversary spoofs the victim’s IP address and attempts to open connections with multiple servers. Those servers direct their SYN/ACK responses to the victim server. This rapidly consumes the victims bandwidth.

19
Q

DNS Poisoning

A

A redirection attack that aims to corrupt the records held by the DNS (Domain Name Systems) server. The intention is to redirect traffic for a a legitimate domain to a malicious IP address.

Links names to IP addresses.

20
Q

Domain Hijacking

A

An adversary gains control over the registration of a domain name, allowing the host records to be configured to IP addresses of the attacker’s choosing.

21
Q

Zero Day

A

Vulnerability that is exploited before a developer knows about it.

22
Q

Pass the Hash

A

Network based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to a network.

23
Q

IV

A

(Initialization Vector) A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.

In the case of a IV attack the adversary is able to predict the IV, thus giving them access to encrypted data.

24
Q

Rogue AP

A

An unauthorized installation on a network which allows an attacker to connect to the network.

25
Q

Jamming

A

An attack on a network. An AP (access point/radio signal) is set up with a stronger signal. In turn it disrupts the original signal.

26
Q

RFID

A

Encoding information into passive tags.

Radio Frequency Identification

27
Q

Disassociation

A

An attacks sends disassociation packets/frames to a target. The station cannot communicate on the network.

28
Q

Cryptographic attacks

A

Circumventing the security of a cryptographic system.

29
Q

Rainbow Tables

A

A type of password attack where an attacker uses a set of related plaintext passwords and their hashes to crack passwords.

30
Q

Collision

A

The act of two different plaintext inputs producing the same exact ciphertext output.

31
Q

Skimming

A

An attacker uses a fraudulent RFID reader to access RFID tags. Encrypting information is best mitigation technique.

32
Q

Birthday Attack/Paradox

A

Paradox: asks how large must a group be so that the chance of two of them sharing a birthday.
Attack: brute force attack aimed at exploiting collisions in hash functions. A collision is where function produces the same hash value for two different plaintexts.