Active_Attacks_Flashcards

1
Q

Man-in-the-Middle (MITM)

A

Intercepting communications to read, alter, or inject data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Session Hijacking

A

Taking over an active user session by stealing cookies or session tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

Impersonating another device or user, such as IP or DNS spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Injection Attacks

A

Inserting malicious code or commands into input fields or data streams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replay Attacks

A

Capturing and resending valid data packets for unauthorized actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial-of-Service (DoS)

A

Overloading a system with requests to make it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distributed Denial-of-Service (DDoS)

A

Multiple systems flooding a target to overwhelm resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logic Bombs

A

Malware triggered by specific conditions to disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privilege Escalation

A

Exploiting bugs to gain unauthorized higher-level permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer Overflow

A

Overwriting memory regions to execute arbitrary code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-Day Exploits

A

Attacking vulnerabilities not yet patched or publicly known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan Horse

A

Malicious software disguised as legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Encrypting user data and demanding payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worms

A

Self-replicating malware that spreads across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware/Adware

A

Collecting sensitive information or displaying unwanted advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Tricking users into providing sensitive information via fake emails or websites.

17
Q

Spear Phishing

A

A targeted version of phishing aimed at specific individuals or organizations.

18
Q

Baiting

A

Offering something enticing to trick users into exposing data or installing malware.

19
Q

Brute Force

A

Attempting all possible combinations to crack passwords or encryption.

20
Q

Keylogger Attacks

A

Capturing keystrokes to extract sensitive data like passwords.

21
Q

Cryptanalysis

A

Exploiting weaknesses in cryptographic algorithms to decrypt data.

22
Q

Evil Twin Attack

A

Creating a rogue Wi-Fi network to intercept data.

23
Q

Deauthentication Attack

A

Disconnecting users from a Wi-Fi network to capture credentials.

24
Q

Advanced Persistent Threats (APTs)

A

Long-term targeted attacks for stealing data or compromising infrastructure.

25
Q

DNS Spoofing/Cache Poisoning

A

Redirecting users to malicious websites by altering DNS records.

26
Q

BGP Hijacking

A

Redirecting internet traffic by manipulating routing tables.

27
Q

Malicious Insiders

A

Employees intentionally exploiting their access for malicious purposes.

28
Q

Exploited Insiders

A

Attackers tricking insiders into performing malicious actions.

29
Q

Firmware Tampering

A

Modifying firmware to control or disrupt IoT devices.

30
Q

Botnet Formation

A

Compromising IoT devices to form a botnet for attacks.

31
Q

USB Injection

A

Using infected USB drives to deploy malware.

32
Q

Hardware Trojans

A

Malicious modifications to hardware for spying or sabotage.

33
Q

Cross-Tenant Access

A

Exploiting vulnerabilities in shared cloud environments.

34
Q

Account Hijacking

A

Gaining unauthorized access to cloud accounts to manipulate data.

35
Q

Deepfake Attacks

A

Using AI to create fake video or audio content for deception.

36
Q

Adversarial AI

A

Attacking machine learning models to manipulate outcomes.