3.4 Attacks and Exploits Flashcards

Given a scenario, research attack vectors and perform attacks on cloud technologies.

1
Q

What are some vulnerabilities that a container image can have?

A

-Embedded malware
-Missing critical security updates
-Outdated software
-Configuration defects
-Hand-coded clear text passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What cloud storage misconfigurations can expose data and apps to risks?

A

-Incorrect permissions: If the default public read/write permissions are not properly configured, data can be freely accessed or the repository can be misused for malware
-Incorrect origin settings: If the Cross Origin Resource Sharing (CORS) policy is weakly configured, it exposes a site to vulnerabilities such as XSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Cloud Malware Injection attack?

A

In this attack, a malicious actor injects malicious code into an application. These attacks include SQLi and XSS. The service can also fall victim to a wrapper attack, which wraps and conceals malicious code, in order to bypass standard security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Side-Channel attack?

A

Also called a sidebar or implementation attack, this exploit is possible because of the shared nature of the cloud infrastructure, especially in a PaaS model. In this attack, the hardware leaks sensitive information such as cryptographic keys, via a covert channel, to a potential attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Direct-to-origin (D2O) attack?

A

In a D2O attack, malicious actors try to identify the origin network or IP address in order to then launch a direct attack. This is used to circumvent protection methods that organizations employ against DDOS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some ways in which credentials can be harvested?

A

Phishing, social engineering, digital scamming, malware, MITM attacks, DNS poisoning etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In relation to PrivEsc what can you do with a Security Account Manager (SAM) file?

A

Either dump the contents of the SAM file to get the hashed passwords or copy the file using Volume Shadow Service (VSS) and then crack the passwords offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In relation to PrivEsc what can you do with Local Windows User Account Control (UAC)?

A

Bypass local UAC, by using process injection to leverage a trusted publisher certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In relation to PrivEsc what can you do with weak process permissions?

A

Find processes with weak controls and then see if you can inject malicious code into those processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In relation to PrivEsc what can you do with shared folders?

A

Search for sensitive information in share folders, as it is common for them to have few or no restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In relation to PrivEsc what is Dynamic Link Libraries (DLL) hijacking?

A

With this technique, you elevate privileges by exploiting weak folder permissions, unquoted service paths or applications that run from network shares.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In relation to PrivEsc what can you do with writeable services?

A

Edit the startup parameters of a service, including its executable path and account. You could also use unquoted service paths to inject a malicious app that the service will run during startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Resource Exhaustion?

A

This is a DoS attack, where the focus is on consuming system resources and can lead to a system crash or failure, by:
-Amplification or volumetric attacks focusing on saturating the bandwidth of the network resource.
-A denial-of-sleep attack draining the device’s battery, thereby rendering it inactive.
-A slow HTTP attack, which sends fragmented requests and can stress the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of DoS attack types?

A

Packet flood, SYN flood, Slowloris, NTP amplification, HTTP flood attack, DNS flood attack and DNS amplification attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Software Development Toolkit (SDK)?

A

An SDK is a package of tools dedicated to a specific programming language or platform commonly used by developers wile creating applications because it comes with a collection of elements needed for that task and, in many cases, includes a debugger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly