Advanced Threats Flashcards

1
Q

IV (Initialization Vector)

A

Provides randomization of encryption keys to ensure they are not reused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IV Attack

A

Packet injection to increase the number of packets to analyze and discover the encryption key. (Less keys means higher risk of discovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Banner Grabbing

A

Fingerprinting attack. Telnet Port 80. HTML response might have useful info such as Web Server software brand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spoofing

A

Email Spoofing, MAC Address Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smurf Attack

A

Spoofs source IP address of a directed broadcast ping packet to flood a victim with ping replies.

Countermeasure: Disable Directed Broadcasts. Most routers do this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SYN Flood

A

Disrupts TCP handshake process.

Client sends Syn
Server Sends SYN/ACK
Client never responds with ACK

This leaves connections open. Once connection limit is reached, server is unreachable.

Countermeasure: Flood guards (included in most firewalls and IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XMAS Attack

A

Recon attack. Sets certain bits/flags in packet headers.

Different OS’s respond in different ways. Attackers analyze responses.

Most IDS and IPS can detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay attacks

A

Attacker replays data that was already part of session.

Countermeasure: Timestamp and sequence numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MITM

A

Interception/Eavesdropping

Kerberos helps prevent MITM attacks with mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password attack location

A

Online and Offline Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Birthday attack

A

Attacker create a password that produces the same hash as the users actual password.

Countermeasure: Increase the number of bits in the hash to increase the number of possible hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rainbow table attack

A

Attempts to discover password from hash.

Uses “huge databases of precomputed hashes.”

Countermeasure: Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Poisoning

A

Modifies or Corrupts DNS results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

Corrupts the DNS Server or DNS Client

Client DNS Pharming modifies the hosts file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP Poisoning

A

Misleads computers or switches about the actual MAC address of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two ARP Poisoning attacks

A

ARP MITM, ARP DoS

17
Q

Watering Hole Attack

A

Attempts to discover which web sites employees will likely visit and infects those sites with malware that can infect visitors.

18
Q

Session Hijacking

A

Attacker learns session ID and uses it to impersonate user

19
Q

Flash Cookies and LSO’s (local shared objects)

A

Used for tracking

20
Q

Arbitrary Code Execution

A

Attacker executes commands on a target system

21
Q

Remote Code Execution

A

Attacker executes code from a remote system

22
Q

Header Manipulation

A

Attacker modifies data in a packet such as session ID

23
Q

Race condition

A

Two or more applications attempt to access a resource at the same time.

24
Q

Buffer Overflow

A

Application receives more input that it can handle or different than it expects. Exposes system memory.

25
Q

SQL Injection

A

Pass queries to back end DB’s through web servers

26
Q

or ‘1’ = ‘1’

A

SQL Injection phrase to create “true” condition

27
Q

SQL Injection Prevention

A

Input validation and sending requests to “stored procedures”

28
Q

Cross Site Scripting

A

Scripts are injected into websites. Scripts contain malicious code.

29
Q

Cross Site Request Forgery (XSRF)

A

Bad links on good sites. Users perform actions on web sites without their knowledge.

Countermeasure: Sign back in before to performing actions. Expire cookies after a short time.

30
Q

Command injection

A

Inject OS commands into web forms or text boxes.

Countermeasure: Input Validation

31
Q

Transitive access

A

Jumping from a public service to a private one. Ex: Going from public web server to back end DB server.

Common example: SQL Injection

32
Q

Fuzzing

A

Send random data to an application. Random data can crash the program or provide unexpected results.