2.4 Flashcards
How is phising usually delivered ?
Phone, sms or email
What is phishing ?
Social engineering with a touch of spoofing.
What is a good indication of phishing ?
Provided URL, dodgy font, graphics or spelling.
What is Vishing ?
Vishing is done over phone (basically Caller ID is spoofed).
Give an example of Vishing
Fake security checks or bank updates
What is Wireless evil twins ?
Fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications
What is spear phishing ?
Going for a specific groups of users.
What is a good resource for monitoring zero-day attacks ?
Checking hacker forums/websites
What is spoofing ?
Masquerading as another user or device
Give some examples of spoofing
Faking a Legitimate:
IP address.
MAC address.
Username/password.
What is the result of a Structured Query Language (SQL) injection ?
Attacker gains acces to a database.
What is good practice in preventing a wireless evil twin ?
Encrypt i.e. https and a VPN
What does a anti-DDoS system do ?
Filter out traffic by looking for patterns associated with DDoS attacks.
What are the two kinds of on path attacks ?
Network and browser
https://www.youtube.com/watch?v=pY20_7l8AKc
ARP
Address Resolution Protocol