1.2 Cyberthreats Flashcards

1
Q

Attacker profiles and motivations

A
  • Cybercriminals
  • State-affiliated groups
  • Hacktivists
  • Cyberterrorists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modern cyber-attack strategy

A
  1. Reconnaissance
  2. Weaponization (methods to compromise a target)
  3. Delivery
  4. Exploitation (trigger)
  5. Installation
  6. Command and control
  7. Action on the Objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reconnaissance tools

A
  • Network analyzers
  • Network vulnerability scanners
  • Password crackers
  • Port scanners
  • Web application vulnerability scanners
  • Wi-Fi vulnerability scanners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C2 traffic techniques and tools

A
  • Encryption
  • Circumvention (proxies, remote access tools, or tunneling)
  • Port evasion
  • Fast Flux (Dynamic DNS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly