1.2 Types of Attacks Flashcards
Compare and Contrast types of Attacks
Social Engineering
A form of attack that exploits human nature and human behavior. Social engineering attacks two primary forms: convincing someone to perform unauthorized operation or convincing them to reveal confidential information
Phishing
Is the process of attempting to obtain sensitive information such as usernames, passwords, credit card details, and other PII by masquerading as a trustworthy entity
Spear Phishing
Is a more targeted form of phishing where the message is crafted and directed specifically to an individual or group of individuals. The hope if the attack is that someone who already has an online/ digital relationship with an organization is more likely to fall for the false communication
Whaling
Is a form of phishing that targets specific high-value individuals.
Vishing
Phishing done over VoIP services
Tailgating
Occurs when an unauthorized entity gains access to a facility under the authorization of a valid worker but without their knowledge
Piggybacking
Occurs when an unauthorized entity gains access to a facility of a valid worker but with their knowledge and consent
Impersonation
Is the act of taking in the identity of some else. The purpose of impersonation is to trick someone into believing your’re the claimed identity so you can use the power ir authority of that identity. Impersonation is also known as masquerading or spoofing
Dumpster Diving
Is the act of digging through trash in order to obtain information about a target organization or individual. It can provide an attacker information that could make social engineering attacks easier or more effective
Shoulder surfing
Occurs when someone is able to watch your keyboard or view your display. This may allow them to learn your password, see information that is confidential, private or simply not for their eyes
Hoaxes
Is a form of social engineering designed to convince targets to perform an action that will cause problems or reduce their IT security. A Hoax is often an email that proclaims some imminent threat is spreading across the Internet and that you must perform certain tasks in order to protect yourself
Watering Whole Attacks
Is a form of targeted attack against a region, a group or an organization. It’s waged by poisoning a commonly accessed resource
Arbitrary Code of Execution
Is the ability to run any software on a target system
Denial of Service Attack
DoS is a form of attack that has a primary goal of preventing the victimized system from performing legitimate traffic.
Smurf Attack
This is from DRDs uses ICMP echo reply packets (ping packets)
Xmas Attack
Its a form of port scanning that can be performed by wide number of common ports scanners including Map, Xprobe, and Hping2. The Xmas scan sends TCP packets to a target port with the flags URG, PSH, FIN all turned on.
Distributed Denial of Service
DDoS employs an amplification or bounce network that is an unwilling or unknowing participants that is unfortunately able to receive broadcast messages and create message responses, echoes, or bounces. In effect, the attacker sends spoofed message packets to the amplification networks broadcast address
Man-in-the-middle
is a form of communication eavesdropping attack. Attackers position themselves in the communication stream, between the client and the server. The client and server believe they’re communicating directly with each other.
Buffer Overflow
Occurs due to the lack of secure defensive programming. The exploitation of a buffer overflow can result in a system crash or arbitrary code execution. A buffer overflow occurs when a program receives input larger than it was designed to accept or process.
Injection Attacks
is any exploitation that allows an attacker to submit code to a target system in order to modify its operations and/or poison and corrupt data set.
SQL Injection
Attack allows a malicious individual to perform SQL transactions directly against the underlying database through a website front end.
directory traversal
an attack that enables an attacker to jump out of the web root directory structure and into any other part of the filesystem hosted by the web servers host OS
Cross-site scripting
XSS is a form of malicious code injection attacks in which an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors.
Cross-site request forgery
XSFR is an attack focused on the visiting users web browser more than on the website being visited. The main purpose of XSRF is to trick the user or users browser into performing actions they had not intended or world not have authorized.
Privilege Escalation
Occurs when a user account is able to obtain unauthorized access to higher levels of privileges.
ARP Poisoning
Is the act of falsifying the IP-to-MAC address resolution system employed by TCP/IP
Amplification
an attack is one where the amount of work ir the traffic generated by the attacker is multiplied in order to cause a significant volume of traffic to be delivered to the primary victim.