Advanced Cyber Attacks Flashcards
A type of Distributed Denial-of-Service (DDoS) attack where the attacker exploits publicly accessible servers to amplify the attack’s impact on the target.
Example: An attacker uses a vulnerable server to send a large volume of traffic to overwhelm a target system.
Amplified DDoS attack
A DDoS attack that aims to overwhelm the target’s network by flooding it with high volumes of traffic, consuming all available bandwidth.
Example: A massive traffic flood that causes a website to become inaccessible by using up all its bandwidth.
Volumetric DDoS attack
An attack where the attacker sends traffic to a third-party server, which then redirects it to the target, making it appear as if the traffic originated from the server.
Example: An attacker sends a request to a server, which then forwards the request to a target, making it harder to trace the source.
Reflected DDoS attack
A DDoS attack that targets specific applications or services on a server, aiming to exhaust system resources and make them unavailable.
Example: An attacker sends a series of complex requests to a web application, overloading its processing capabilities.
Application DDoS attack
A type of attack where an attacker falsifies DNS records to redirect traffic from a legitimate website to a malicious one.
Example: A user is redirected to a fake login page after entering a website’s URL due to manipulated DNS records.
DNS Spoofing
A cyber attack where attackers use previously leaked username and password combinations to gain unauthorized access to accounts on other sites.
Example: An attacker tries multiple username and password combinations from past data breaches to break into online banking accounts.
Credential Stuffing
An attack where an attacker registers a domain name that is similar to a popular one, often to steal traffic or impersonate a legitimate site.
Example: An attacker registers a slightly misspelled version of a popular brand’s website to deceive users into visiting it.
URL Hijacking
The act of gaining unauthorized access to a registered domain name and transferring it to a different owner, often for malicious purposes.
Example: An attacker gains control over a company’s domain name and transfers it to another registrar to sell it.
Domain Hijacking
An attack where a malicious actor inserts false DNS records into a resolver’s cache, redirecting users to fraudulent or malicious sites.
Example: A user unknowingly visits a fake website after the DNS cache was manipulated to redirect traffic.
DNS cache poisoning
An attack where an attacker sends spoofed Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of another device, enabling interception of traffic.
Example: A network attacker intercepts data meant for another user by manipulating address resolution.
ARP poisoning
A malicious tactic where an attacker registers domain names similar to popular ones to exploit users who make typing errors.
Example: A user intending to visit a legitimate site ends up on a fraudulent page due to a misspelled URL.
Typosquatting
An attack in which a single entity creates multiple fake identities to manipulate or disrupt a system, especially in peer-to-peer networks.
Example: A network is overwhelmed with fake nodes created by an attacker to control decision-making.
Sybil Attack
An unauthorized wireless access point installed on a network, often used by attackers to intercept traffic or gain access.
Example: An attacker sets up an unauthorized device to mimic a company’s Wi-Fi network and steal credentials.
Rogue (AP) Access Point
A secure server used to bridge access between different security zones, often for administrative purposes in sensitive environments.
Example: Administrators use this system to securely connect to production servers in a restricted network.
Jump Server
A basic network device that connects multiple devices on a LAN and lacks advanced management or configuration features.
Example: A simple device used to expand a home network without any administrative setup.
Unmanaged Switch
A hardware device used to monitor and capture network traffic without interrupting the flow of data between devices.
Example: Security teams use this device to passively analyze network traffic for suspicious activity.
Network Tap
An attack that sends spoofed disassociation frames to a wireless network, forcing connected devices to disconnect from the access point.
Example: A user’s device repeatedly disconnects from a Wi-Fi network due to malicious interference.
Wireless Disassociation Attack
An attack where a malicious actor disrupts wireless communication by overwhelming the network with interference or noise.
Example: Devices in a specific area cannot connect to Wi-Fi due to intentional signal interference.
Wireless Jamming
A wireless technology that allows data exchange between devices in close proximity, typically within a few centimeters.
Example: A smartphone is used to make a contactless payment at a point-of-sale terminal.
NFC Communication (Near Field Communication)