2. Attacks Flashcards
Into what broad categories can attacks be grouped?
Software and protocol/service.
social engineering
An attack against a user, typically involves some form of social interaction.
phishing
An attacker masquerades as a trusted entity to obtain sensitive information from users.
spear phishing
A phishing attempt that targets a specific group.
whaling
A phishing attempt at a high-value target.
vishing
A phishing attempt using voice communication technology.
tailgaiting
The tactic of following closely behind a person who has just used their own legitimate access to a building or room.
impersonation
An attacker assumes a role that is recognized by the target, and uses the target’s bias against their better judgement.
third-party authorization
Using previously obtain information (project, deadline, boss, etc.) an attacker arrives with:
- something the victim is quasi-expecting and would otherwise see as normal,
- the guise of an urgent issue in which the attacker would be helpful, or someone not to upset,
- and a name drop of “Mr. Big”.
watering hole attack
The method of infecting a target website with malware. These are complex and often the work of nation states.
list: 2 major social engineering principles
- Most people want to be helpful.
2. Most people seek to avoid confrontation.
list: at least 5 social engineering tools
Authority Intimidation Consensus Scarcity Familiarity Trust Urgency
describe: trust (social engineering)
An understanding of how something will act under specific conditions.
The whole objective of social engineering is not to force people to do things they would not do, but rather to give them a pathway that leads them to feel they are doing the correct thing in that moment.
DoS
Denial of Service. An attack to prevent access to a target system.
DDoS
Distributed Denial of Service. An attack that employs multiple attacking systems, typically a botnet.
man-in-the-middle
An attack that inserts itself between 2 legitimate communicators. All communication is routed through the attacker’s host.
session hijacking
A MitB attack. Information is stolen and allows the attacker to impersonate a legitimate session.
Example is a cross-site scripting attack, which tricks the user into executing code, resulting in cookie theft.
buffer overflow
The input buffer that is used to hold program input is overwritten with data that is larger than the buffer can hold.
They typically inherit the privilege level of the program being exploited.
list: root causes of buffer overflow
Poor programming practice and programming language weakness.
C was designed for space and performance. Many functions, like gets() are unsafe in that they permit operations such as unbounded string manipulation into fixed buffer locations.