Active_Attacks_Flashcards

1
Q

Man-in-the-Middle (MITM)

A

Intercepting communications to read, alter, or inject data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Session Hijacking

A

Taking over an active user session by stealing cookies or session tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

Impersonating another device or user, such as IP or DNS spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Injection Attacks

A

Inserting malicious code or commands into input fields or data streams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replay Attacks

A

Capturing and resending valid data packets for unauthorized actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial-of-Service (DoS)

A

Overloading a system with requests to make it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distributed Denial-of-Service (DDoS)

A

Multiple systems flooding a target to overwhelm resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logic Bombs

A

Malware triggered by specific conditions to disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privilege Escalation

A

Exploiting bugs to gain unauthorized higher-level permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer Overflow

A

Overwriting memory regions to execute arbitrary code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-Day Exploits

A

Attacking vulnerabilities not yet patched or publicly known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan Horse

A

Malicious software disguised as legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Encrypting user data and demanding payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worms

A

Self-replicating malware that spreads across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware/Adware

A

Collecting sensitive information or displaying unwanted advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Tricking users into providing sensitive information via fake emails or websites.

17
Q

Spear Phishing

A

A targeted version of phishing aimed at specific individuals or organizations.

18
Q

Baiting

A

Offering something enticing to trick users into exposing data or installing malware.

19
Q

Brute Force

A

Attempting all possible combinations to crack passwords or encryption.

20
Q

Keylogger Attacks

A

Capturing keystrokes to extract sensitive data like passwords.

21
Q

Cryptanalysis

A

Exploiting weaknesses in cryptographic algorithms to decrypt data.

22
Q

Evil Twin Attack

A

Creating a rogue Wi-Fi network to intercept data.

23
Q

Deauthentication Attack

A

Disconnecting users from a Wi-Fi network to capture credentials.

24
Q

Advanced Persistent Threats (APTs)

A

Long-term targeted attacks for stealing data or compromising infrastructure.

25
DNS Spoofing/Cache Poisoning
Redirecting users to malicious websites by altering DNS records.
26
BGP Hijacking
Redirecting internet traffic by manipulating routing tables.
27
Malicious Insiders
Employees intentionally exploiting their access for malicious purposes.
28
Exploited Insiders
Attackers tricking insiders into performing malicious actions.
29
Firmware Tampering
Modifying firmware to control or disrupt IoT devices.
30
Botnet Formation
Compromising IoT devices to form a botnet for attacks.
31
USB Injection
Using infected USB drives to deploy malware.
32
Hardware Trojans
Malicious modifications to hardware for spying or sabotage.
33
Cross-Tenant Access
Exploiting vulnerabilities in shared cloud environments.
34
Account Hijacking
Gaining unauthorized access to cloud accounts to manipulate data.
35
Deepfake Attacks
Using AI to create fake video or audio content for deception.
36
Adversarial AI
Attacking machine learning models to manipulate outcomes.