(7) Authentication Failures Flashcards

1
Q

What is password spraying?

A

Password spraying is when an attacker uses a list of normally used passwords and tries to login to as many different user accounts as they can with those passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is credential stuffing?

A

Credential stuffing is when an attacker grabs a list of usernames and passwords that we taken in the hacking of one website and uses them to get access to other websites.

This is successful when users use the same password over many different sites.

Multi-Factor Authentication can really help with these types of issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are impersonation attacks?

A

Impersonation attacks happen when an attacker uses the identity of a real user.

OAuth redirects can allow this to happen. To prevent impersonation attacks, stronger session handling techniques might be needed (See OWASP for details on this).

Securing session identifiers that attackers can get might be useful too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are on path attacks?

A

On path attacks are also known as man in the middle attacks. It happens when a attacker is able to interfere in the communication flow between two systems.

The attacker gets between the host server and the recipient so that the person on path (or in the middle) can see what is being sent and could be able to read what is being sent if they are able to decrypt what is being sent (if needed).

End to end encryption can help stop on path attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is session hijacking?

A

Session hijacking is when an existing session is taken over by acquisition of a session key or cookies used by the server to validate what is going on or causing the session to go through a system that is in control of the attacker.

Encrypting network sessions and securing the data needed to pull off these attacks, or links or on the local system can help prevent hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is machine learning?

A

Machine learning involves using principles of computer science and statistics to find hidden knowledge within data that we pile up every day.

Machine learning helps uncover trends in data, create categories for records, and runs businesses more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does an attacker take advantage of machine learning?

A

An attacker takes advantage of data poisoning by modifying or influencing the training dataset within the machine learning model in order to create false models.

Normally machine learning uses a training dataset from past activity to make a model that could be used to predict the future, but data poisoning aims to mess that process up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly