2. Attacks Flashcards

1
Q

Into what broad categories can attacks be grouped?

A

Software and protocol/service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

social engineering

A

An attack against a user, typically involves some form of social interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

phishing

A

An attacker masquerades as a trusted entity to obtain sensitive information from users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

spear phishing

A

A phishing attempt that targets a specific group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

whaling

A

A phishing attempt at a high-value target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

vishing

A

A phishing attempt using voice communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tailgaiting

A

The tactic of following closely behind a person who has just used their own legitimate access to a building or room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

impersonation

A

An attacker assumes a role that is recognized by the target, and uses the target’s bias against their better judgement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

third-party authorization

A

Using previously obtain information (project, deadline, boss, etc.) an attacker arrives with:

  1. something the victim is quasi-expecting and would otherwise see as normal,
  2. the guise of an urgent issue in which the attacker would be helpful, or someone not to upset,
  3. and a name drop of “Mr. Big”.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

watering hole attack

A

The method of infecting a target website with malware. These are complex and often the work of nation states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

list: 2 major social engineering principles

A
  1. Most people want to be helpful.

2. Most people seek to avoid confrontation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

list: at least 5 social engineering tools

A
Authority
Intimidation
Consensus
Scarcity
Familiarity
Trust
Urgency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe: trust (social engineering)

A

An understanding of how something will act under specific conditions.

The whole objective of social engineering is not to force people to do things they would not do, but rather to give them a pathway that leads them to feel they are doing the correct thing in that moment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS

A

Denial of Service. An attack to prevent access to a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DDoS

A

Distributed Denial of Service. An attack that employs multiple attacking systems, typically a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

man-in-the-middle

A

An attack that inserts itself between 2 legitimate communicators. All communication is routed through the attacker’s host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

session hijacking

A

A MitB attack. Information is stolen and allows the attacker to impersonate a legitimate session.

Example is a cross-site scripting attack, which tricks the user into executing code, resulting in cookie theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

buffer overflow

A

The input buffer that is used to hold program input is overwritten with data that is larger than the buffer can hold.

They typically inherit the privilege level of the program being exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

list: root causes of buffer overflow

A

Poor programming practice and programming language weakness.

C was designed for space and performance. Many functions, like gets() are unsafe in that they permit operations such as unbounded string manipulation into fixed buffer locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SQL injection

A

A tactic of modifying input to result in an SQL statement. XML and LDAP injections are done in the same fashion.

21
Q

XSS

A

Cross-site scripting. A common web attack method, wherein an attacker can include a script in their input, and have it rendered as part of the web process.

22
Q

list: 3 types of XSS attacks

A
  1. Non-persistent XSS. Injected script not stored, but just immediately executed and passed back via the web server.
  2. Persistent XSS. Script permanently stored on web server or some back-end storage.
  3. DOM-based XSS. Script executed in browser via the Document Object Model (DOM) process, as opposed to the web server.
23
Q

list: 4 ways to limit XSS attacks

A
  1. Use of anti-XSS libraries to strip scripts from input sequences.
  2. Limiting types of uploads.
  3. Screening size of uploads.
  4. Whitelisting inputs
24
Q

XSRF

A

Cross-site request forgery. An attack that utilizes unintended behaviors that are proper in defined use, but are performed under circumstances outside authorized used.

An example of the confused deputy problem.

Performed against sites that have authenticated a user. The attack exploits the site’s trust in a previous authentication event.

By tricking a user’s browser to send an HTTP request to the target site, the trust is exploited.

25
Q

list: 4 protections against XSRF

A
  1. Limit authentication times
  2. Cookie expiration
  3. Web page header checking
  4. Random XSRF tokens (strongest method)
26
Q

list: privilege escalation methods

A
  1. Using existing privilege and then do an act that steals better credentials (e.g. user of a sniffer, getting the SAM or etc/passwd file).
  2. Through vulnerabilities in running processes that have elevated privilege (e.g. injecting malicious code).
27
Q

ARP poisoning

A

Wherein an attacker corrupts an ARP table, causing packets to be misrouted.

28
Q

amplification

A

Wherein an attacker uses a specific protocol to achieve what a single machine cannot do by itself (e.g. ICMP command ping).

29
Q

DNS poisoning

A

The changing of where DNS is resolved.

Using a VPN can change a DNS source, and this may be desired, but unauthorized changes can be attacks.

30
Q

domain hijacking

A

The act of changing the registration of a domain name without the permission of its original registrant.

31
Q

DNS spoofing

A

Wherein an attacker changes a DNS record.

32
Q

DNSSEC

A

Domain Name System Security Extensions. A US gov project that digitally signs DNS records with a key.

33
Q

Man-in-the-Browser

A

An MitB attack that changes browser behavior through helper objects or extensions. The financial malware Zeus targeted financial transactions on user machines, changing input after the users entered their credentials.

34
Q

zero-day attack

A

One that uses a vulnerability for which there is no previous knowledge outside of the attacker, or at least not the software vendor.

35
Q

replay attack

A

Wherein the attacker captures a portion of a communication between two parties and retransmits it at a later time.

36
Q

list: 3 protections from replay attacks

A
  1. Encryption
  2. Cryptographic authentication
  3. Time stamps
37
Q

pass the hash

A

A hacking technique where the attacker captures the hash used to authenticate a process.

38
Q

hijacking

A

An attacker that hijacks a user’s experience, typically after an exchange of credentials, or in the background in a manner where the user is unaware of the attack.

39
Q

clickjacking

A

Tricks a user into clicking something different from what the user perceives. May be a transparent overlay, or some other rogue disguise, but net result is that user unknowingly clicks an attacker’s hidden control, causing the browser to execute the attacker’s code.

40
Q

session hijacking / TCP/IP hijacking

A

A process of taking control of an already existing session between a client and server.

Advantage is that the attacker does not have to circumvent any authentication methods.

41
Q

URL hijacking

A

A generic names for a wide range of attacks that target the URL - the primary means by which a user receives web content.

42
Q

typo squatting

A

A URL attack that involves routing traffic to similarly-spelled, but illegitimate sites.

43
Q

driver manipulation

A

An attack on a system by changing drivers, thus changing the behavior of a system.

44
Q

shimming

A

To put a layer of code between the driver and the OS.

Can be used to improve portability between OS updates. Can also be used maliciously.

45
Q

refactoring

A

The process of restructuring existing software without changing its external behavior.

46
Q

spoofing

A

Simply making data appear as though it comes from a different source.

47
Q

smurf attack

A

Wherein the packet sent by the attacker to a broadcast address is an echo request with the From address forged.

48
Q

Describe spoofing a trusted relationship.

A

An attacker can take advantage of a trusted relationship (two systems are configured to accept the authentication of each other) by modifying a packet to have a trusted system’s From address instead of the attacker’s From address.

49
Q

IV attack

A

Initialization Vector attack.