2.2 Flashcards

Common threat vectors, phishing, impersonation, watering hole attacks, other social engineering attacks

1
Q

A method used by the attacker to gain access to systems

A

Threat vector

AKA attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can message-based attack vectors be used? (3)

A

Phishing attacks - thru email, text, IM

Malware - email attachment

Social engineering - invoice scams, cryptocurrency scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can image-based attack vectors be used? (1)

A

Image format (SVG, XML) can allow an attacker to edit the image description to include:
HTML injection
Javascript attack code

This can be prevented via browser input validation that will avoid running malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can voice call attack vectors be used? (4)

A

Vishing - tries to obtain info over phone

Spam over IP - large-scale automated phone calls

War dialing

Call tampering - disrupting voice calls, DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can file-based attack vectors be used? (3)

A

PDF format can contain other objects

ZIP/RAR/compressed files may contain different files

MS Office files can contain macros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can removable device attack vectors be used? (4)

A

Get around the firewall via USB interface, can infect airgapped networks

Malicious software on USB

USB devices can act as keyboards

Data exfiltration - transfer large amts of info, unplug it, and walk out the door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can vulnerable software attack vectors be used? (2)

A

Client-based software
The attacker can infect the application/executable
This requires constant updates to mitigate

Agentless software
The attacker can compromise the central server, and would thereby affect all other users
This is very easy to distribute because, since this software is not installed on a machine, each person logging into that service is using a new (infected) instance of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between client-based and agentless software

A

Client-based software is installed on the system

Agentless software does not need to be installed; you connect to a separate system to access it, like a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can unsupported system attack vectors be used? (3)

A

Unsupported systems are not patched, so there are no new security fixes

The manufacturer is under no obligation to help in crisis

A single system could be an entry - keep your inventory and records current, make sure to identify every single unsupported system/application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can unsecure network attack vectors be used? (4)

A

Attackers can view all non-encrypted data

Open or rogue wireless network can be accessed

Wired or wireless interfaces without 802.1X will not have proper authentication requirements

Bluetooth can be used for reconnaissance, or attackers can root out implementation vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which wireless security protocols are outdated? (3)

A

WEP, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An authentication protocol used by wired AND wireless networks that prevents access to a network without providing proper credentials

A

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can open service port attack vectors be used? (3)

A

Applications that listen to specific ports might be vulnerable or misconfigured

More services (more open ports) expand the attack surface)

Misconfigured firewall rules can allow access to ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can default credentials attack vectors be used? (1)

A

Attackers can guess or search for default credentials online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can supply chain attack vectors be used? (4)

A

A third party can have access to your infrastructure by riding inside trusted/existing equipment/software that has been tampered with. Attackers can tamper with the underlying infrastructure or manufacturing process

If an attacker gains access to your MSP, they have access to your network

Gain access to a network using a vendor

Suppliers can sell counterfeit networking equipment - install backdoors, or have substandard performance/availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of social engineering that uses spoofing to attempt to gather information from the victim

A

Phishing

15
Q

A type of URL hijacking where attackers misspell the domain name in a slight way to fool victims

A

Typosquatting

16
Q

A method that attackers use to get a victim to engage in the fraud before being attacked. This method is NOT the attack itself.

This is often a story that the attacker makes up.

For example, the attacker may call posing as a Visa employee regarding an automated payment, and ask them to check their email.

A fraudulent email may have “RE:” attached to the beginning, making it seem as if it is an ongoing conversation.

An attacker may even impersonate someone and form a friendship/working relationship in order to set the victim up for a scam.

A

Pretexting

17
Q

Phishing over phone or voicemail is called

A

Vishing

18
Q

Phishing over text is called

A

Smishing

19
Q

A type of pretexting where the attacker develops a character and a story, and plays that out with the victim as the audience

A

Impersonation

20
Q

3 ways to protect against impersonation

A

Never volunteer sensitive information (passwords)

Don’t disclose personal details (address, phone number, etc.)

Always verify before revealing info - call back and verify thru 3rd parties

20
Q

True/False

Impersonation can go 2 ways:

An attacker can pretend to be another person to solicit details from you, or

They might pretend to be you to open bank accounts, take loans, obtain tax benefits, or open or credit cards in your name

A

True

21
Q

A type of attack where an attacker compromises a website that many victims access often

ex. Employees might order lunch every week from a certain sandwich shop, and use the online website to place the order. The attacker might compromise the sandwich shop website in order to get into the organization’s network.

A

Watering hole attack

22
Q

3 ways to prevent watering hole attacks

A

Defense-in-depth

Firewalls and IPS together - the firewall might allow it, but the IPS will identify the suspicious traffic

Antivirus/antimalware signature updates

23
Q

A type of social engineering in which people spread false information in order to create confusion, division, sway public opinion on social/political, or create visibility

This is sometimes used by foreign nation-state actors, advertisers, or social media influencers

A

Misinformation/disinformation

24
Q

A type of social engineering where attackers create sites and social media accounts to impersonate popular brands in order to scam/infect victims

A

Brand impersonation