All Types of Attacks and Defenses Flashcards

1
Q

filename=../../../../../etc/passwd

what is this attack and what is the best defense for the attack

A

A directory traversal attack, also known as path traversal attack, occurs when an attacker exploits a vulnerability in a web application to access files and directories outside of the intended directory.

–best defense is proper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application attack that is freely available on the internet and exploit vulnerabilities in various operating systems enabling attackers to elevate privilege.

A

Rootkit (escalation of privilege)

–keep security patches up to date
–anti malware software
–edr/xdr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Undocumented command sequences that allow individuals with knowledge of the ____ to bypass normal access restrictions.
–often used in development and debugging

A

Backdoor

–countermeasures: firewalls, anti-malware, network monitoring, code review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

type of virus-ransomware that encrypts files stored on a computer or mobile device in order to extort money

-back up computer
-store backups separately
-file auto versioning

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of virus that is a nuisance that results in wasted resources. Used to “spread through email from a friend” but have changed with social media.

A

Virus Hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malicious code objects that infect a system and lie dormant until triggered by the occurrence of one or more conditions, such as time program launch, website login

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of virus that is a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network

A

Trojan horse

–best defenses—only allow software from trusted sources
–dont let users install software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of malware that spreads copies of itself from computer to computer,
replicating itself without human interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a program that may be an unwanted app, often delivered alongside a program
the user wants. PUPs include spyware, adware, and dialers

A

Potentially Unwanted Program (PUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

type of malware Designed to log keystrokes, creating records of everything you type on a
computer or mobile keyboard.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware designed to obtain information about an individual, system, or
organization.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a type of malicious software that does not rely on virus
laden files to infect a
host. Instead, it exploits applications that are commonly used for legitimate
and justified activity to execute malicious code in resident memory.

A

Fileless Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a computer controlled by an attacker or cybercriminal which is used to send
commands to systems compromised by malware and receive stolen data
from a target network.

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a malware program that gives an intruder administrative control over a
target computer.

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use programs with built in dictionaries.
They attempt all dictionary words to try and find the
correct password, in the hope that a user would have
used a standard dictionary word.

A

Dictionary Attacks

–countermeasures:
MFA, biometrics, limit number of attempts, force reset after too many attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacker tries a password against many different
accounts to avoid lockouts that typically come when
brute forcing a single account.
Succeeds when admin or application sets a default
password for new users.

A

Password Spraying (brute force)

–countermeasures:
MFA, CAPTCHA, password change on first login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attempts to randomly find the correct cryptographic key
attempting all possible combinations (trial and error)
Password complexity and attacker resources will determine
effectiveness of this attack.

A

Brute Force Attack

—Countermeasures:
cryptographic salts, CAPTCHA, throttling rate of repeated logins, IP blocklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which contain precomputed values of cryptographic hashfunctions to identify commonly used passwords

A

Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is random data that is used as an additional input to a one way function that hashes data, a password or passphrase.

A

Salt

–adding salts to the password before hashing them reduces effectiveness of rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MFA (something you know, have, are) prevents these attacks

A

-Phishing
-Spear Phishing
-Keyloggers
-Credential Stuffing
-Brute and reverse brute force attacks
-MITM attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a collection of compromised computing devices (often called bots or zombies).

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

criminal who uses a command
and control server
to remotely control the zombies
often use the botnet to launch attacks on other
systems, or to send spam or phishing emails

A

Bot Herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Focuses on accomplishing “smart” tasks
combining machine learning and deep
learning to emulate human intelligence

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A subset of
AI, computer algorithms that
improve automatically through experience
and the use of data.

A

Machine Learning (ML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks

A

Deep Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cloud Based Attacks vs On premise Attacks

A

—less attacks to worry about with cloud model because data center is more secure and less vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

attack on a cryptographic hash to find
two inputs that produce the same
hash value

A

Collision Attack

–beat with collision resistant hashes

28
Q

cryptographic attack when a protocol is downgraded
from a higher mode or version to a
low quality mode or lower version.

A

Downgrade attack

–commonly targets TLS

29
Q

an attempt to reuse authentication
requests.

–targets authentication (Kerberos)
—defeat with date time stamps

A

Replay Attack

30
Q

attempt to find collisions in hash functions

–targets digital signatures
–defeat with long hash output

A

Birthday Attack

31
Q

A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.
Occur when an attacker uses a web application to send malicious code to a different end user.

–java script and html
—uses malicious scripts

identified by looking for var command and html script


var money
A

Cross-Site Scripting (XSS)

–input validation and filtering
–validate data length and data type

32
Q

similar to cross-site scripting attacks but exploits a different trust relationship.
exploits trust a website has for your browser to execute code on the user’s computer.

–exploits website trust to execute code

A

Cross Site request Forgery (CSRF or XSRF)

–create web apps that use secure tokens, and sites that check the referring URL in requests to ensure it came from a local site

—example: chaanging bank transfer from 100 to 100,000 by exploiting url

http://bank.com/transfer.do?acct=George&amount= 1000000

33
Q

Is a situation in which the malware tries to inject code into the memory process
space of a library using a vulnerable/compromised ____

A

Dynamic Link Library (DLL)

34
Q

when users enter values that query XML (known as XPath) with values that take
advantage of exploits, it is known as an _____

A

XML Injection Attack

35
Q

Use unexpected input to a web application to gain
unauthorized access to an underlying database.

A

SQL Injection Attacks

—countermeasures:
input validation, use prepared statements, limit account privileges

36
Q

exist when a developer does not validate user input to ensure that it is of an appropriate size (allows Input that is too large can “overflow” memory buffer).

A

Buffer Overflow

–strcpy could create one

–example:
int fun (char data [256]) {
int I
char tmp [64]; strcpy (tmp,data)

–prevent with input validation

37
Q

a timing vulnerability that occurs when a program checks access permissions too far in advance of a resource request.

A

Time of Check to Time of Use (TICTOU)

—file locking, transactions in file system or OS kernal

38
Q

Related to input validation is _______
Every function that has any meaningful functionality should have appropriate _______.
Properly done, the user will simply see an error message box

A

Error Handling

–element of good coding practices

39
Q

an attacker steals a valid session ID of a
user and reuses it to impersonate an
authorized user and perform fraudulent
transactions or activities.

A

Session Replay

–dissalow Session ID reuse in web apps

40
Q

Putting too much information into too small of
a space that has been set aside for numbers.

–arithmitic overflow error does not fit with allocated memory space

A

Integer Overflow

–countermeasures:
good coding practices, appropriate typing of variables

41
Q

When an application continuously allocates additional resources, exhausting machine resources, leading the system to hang or crash.

When exploited, ________ vulnerabilities in apps, software, or system security that hang, crash, or interfere with external programs perform designated tasks properly. Memory leaks can lead to resource exhaustion (see “memory
leaks” in this session).
However, these attacks can be executed by exhausting other resource subsystems, such as CPU, disk, or network.

A

Resource Exhaustion (form of DoS attack when intentional)

42
Q

Many modern programming languages (such as C# and Java) don’t allow the programmer to directly allocate or deallocate memory.
Therefore, those programming languages are not prone to memory leaks.
However, certain older languages, most notably C and C++, give the programmer a great deal of control over memory management.

A

Memory Leak (most common issue in memory management)

–static code analyzer can check if all memory allocation commands

43
Q

Involves creating a library (or modifying an existing) to bypass a driver and perform a function other than the one for which the API was created.

A

Shimming

44
Q

The name given to a set of techniques used to identify the flow and then modify
the internal structure of code without changing the code’s visible behavior.
In legitimate scenarios, this is done in order to improve the design, to remove
unnecessary steps, and to create better code.

A

Refactoring

–malware take advantage of weak code

45
Q

a technique whereby an attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access

–Kerberos TGT tickets expire 10 hours whereas NTML hashes only change when user changes password

A

Pass the Hash (targets NTML)

—prevent by enforcing least privilege access, analyze applications to determine which require admin privileges

46
Q

Attacker sits in the middle between two endpoints and is able to intercept traffic, capturing (and potentially changing) information.

–fools parties into communicating with attacker instead of directly with each other

A

Man in the middle attack (MITM)

–countermeasures:
use secured WiFi, VPN, HTTPS, and MFA

47
Q

pranksters push unsolicited messages to engage
or annoy other nearby Bluetooth through a
loophole in Bluetooth messaging options

A

Bluejacking

-prevent with long pin, 2FA, disable discvoery mode

48
Q

data theft using Bluetooth. Vulnerable devices
are those using bluetooth in public places with
device in discoverable mode.

A

Bluesnarfing

–prevent with long pin, 2fa

49
Q

developed a year after bluejacking, creates a
backdoor attack before returning control of the
phone to its owner.

A

Bluebugging

50
Q

A malicious fake wireless access point set up to
appear as a legitimate, trusted network.

A

Evil Twin
–common in airports and coffee shops

51
Q

A type of DoS attack in which the attacker
breaks the wireless connection between the
victim device and the access point.

A

Disassociation

52
Q

A DoS attack that prevents other nodes from
using the channel to communicate by occupying
the channel that they are communicating on.

A

Jamming (often unintention)

53
Q

attacker alters the domain
name to IP address mappings in a DNS system
may redirect traffic to a rogue system OR
perform denial of service against system.

A

DNS Poisoning

–countermeasures: allow only authorized changes to DNS, restrict zone transfers

54
Q

attacker sends false replies to a
requesting system, beating the real
reply from the valid DNS server.

A

DNS Spoofing

55
Q

Similar to DNS spoofing
Can take the form of DNS spoofing or can simply be an alteration of the hyperlink URLs

A

Hyperlink Spoofing

56
Q

is a resource consumption attack
intended to prevent legitimate activity
on a victimized system.

A

Denial of Service (DoS)

countermeasures:
firewalls, routers, intrusion detection (IDS), SIEM,
disable broadcast packets entering/leaving, disable echo replies, patching

57
Q

a DoS attack utilizing multiple
compromised computer systems as
sources of attack traffic.

A

Distributed Denial of Service DDoS

–firewalls, routers, intrusion detection (IDS), SIEM,
disable broadcast packets entering/leaving, disable echo replies, patching

58
Q

Types of DDoS Attacks

A

—Network volume based attacks targeting flaws in network protocols, often using botnets,
using techniques such as UDP, ICMP flooding, or SYN flooding (TCP based).

—Application exploit weaknesses in the application layer (Layer 7) by opening connections and
initiating process and transaction requests that consume finite resources like disk
space and available memory.

–Operational Technology (OT)Targets the weaknesses of software and hardware devices that control systems in factories, power plants, and other industries, such as IoT devices.

59
Q

Three way handshake order

A
  1. SYN
  2. SYN-ACK
  3. ACK

TCP/IP

60
Q

a vulnerability which allows an attacker
to force users of your application to an
untrusted external site.

A

URL Redirection

61
Q

services and tools provide info as to
whether a domain is a trusted email
sender or is a source of spam email.

A

Domain Reputation

62
Q

involves an individual changing the domain
registration information for a site without
the original registrant’s permission.

A

Domain Hijacking

–COUNTERMEASURES:
domain registration auto renewal, privacy
protection (blocking your name from WHOIS), a trusted domain provider

63
Q

forcing legitimate MAC table contents out of the
switch and forcing a unicast flooding behavior.
potentially sends sensitive info to areas of the
network where it is not normally intended to go.

A

MAC Flooding

64
Q

sending ARP packets across the LAN that
contain the attacker’s MAC address and the
target’s IP address.

A

ARP poisoning spoofing

65
Q

Duplicates the MAC address (hardware
address) of a device, allowing attacker
to appear as a trusted device.

A

MAC Cloning

—Countermeasures: network access control (NAC) toprovide a validation gate to network access.

66
Q

attack that looks for open ports

A

Xmas

67
Q

an exploit in which the attacker runs code on a VM that allows an OS running within it to break out and interact directly with the hypervisor

A

VM Escape