1.2 Given a scenario, analyze potential indicators to determine the type of attack Flashcards
Back Door
UNDOCUMENTED undocumented command sequences that allow individuals with knowledge of the back door to BYPASS normal access restrictions.
Rootkit
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Crypto-malware
Ransomware that encrypts files stored on a computer or mobile device in order
to extort money.
Hoaxes
are a nuisance that result in wasted resources. Used to spread
Logic Bombs
are malicious code objects that infect a system and lie dormant until they are triggered
Trojan Horse
a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network.
Worm
Malware that makes copies of it self without human interaction
PUP
Potineally unwanted programs
Programs that may be a unwanted program
Keylogger
Logs/copies key strokes
Spyware
Malware used to obtain information on a person, system, or organization
Fileless Virus
malious code that resides in RAM
Command Control
a computer CONTROLLED BY AN ATTACKER or cybercriminal which is used to send
commands to systems compromised by malware and receive stolen data
from a target network.
RAT
remote access trojan
Malware program that gives an intruder ADMIN access over a computer
Ransomware
Attacker locks the users files, then request a a ransom to unlock them
Dictionary Attacks
Attacker uses common/dictionary words too obtain access
Password Spraying
Attacker tries a password against many different accounts to avoid lockouts
Offline Attacks
A attempt to discover a password form a captured DATA BASE or packet SCAN
Online Attacks
Attempts to discover a password from an online system. For
Plaintext/Unencrypted
Protocols and authentication methods that leave credentials unencrypted,
Brute Force
Attempts to randomly find the correct cryptographic key attempting all possible combinations
Rainbow Tables
A table of passwords that a attacker can try makes BRUTE FORCE ATTCAK more effective
Salts
Random data added to password at the end to encrypt a HASH
Botnet
A collection of compromised computing devices called a BOT OF ZOMBIES
Malicious Flash Drive
Flash drive that has some form of malware