All Types of Attacks and Defenses Flashcards

1
Q

filename=../../../../../etc/passwd

what is this attack and what is the best defense for the attack

A

A directory traversal attack, also known as path traversal attack, occurs when an attacker exploits a vulnerability in a web application to access files and directories outside of the intended directory.

–best defense is proper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application attack that is freely available on the internet and exploit vulnerabilities in various operating systems enabling attackers to elevate privilege.

A

Rootkit (escalation of privilege)

–keep security patches up to date
–anti malware software
–edr/xdr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Undocumented command sequences that allow individuals with knowledge of the ____ to bypass normal access restrictions.
–often used in development and debugging

A

Backdoor

–countermeasures: firewalls, anti-malware, network monitoring, code review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

type of virus-ransomware that encrypts files stored on a computer or mobile device in order to extort money

-back up computer
-store backups separately
-file auto versioning

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of virus that is a nuisance that results in wasted resources. Used to “spread through email from a friend” but have changed with social media.

A

Virus Hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malicious code objects that infect a system and lie dormant until triggered by the occurrence of one or more conditions, such as time program launch, website login

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of virus that is a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network

A

Trojan horse

–best defenses—only allow software from trusted sources
–dont let users install software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of malware that spreads copies of itself from computer to computer,
replicating itself without human interaction.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a program that may be an unwanted app, often delivered alongside a program
the user wants. PUPs include spyware, adware, and dialers

A

Potentially Unwanted Program (PUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

type of malware Designed to log keystrokes, creating records of everything you type on a
computer or mobile keyboard.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware designed to obtain information about an individual, system, or
organization.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a type of malicious software that does not rely on virus
laden files to infect a
host. Instead, it exploits applications that are commonly used for legitimate
and justified activity to execute malicious code in resident memory.

A

Fileless Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a computer controlled by an attacker or cybercriminal which is used to send
commands to systems compromised by malware and receive stolen data
from a target network.

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a malware program that gives an intruder administrative control over a
target computer.

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use programs with built in dictionaries.
They attempt all dictionary words to try and find the
correct password, in the hope that a user would have
used a standard dictionary word.

A

Dictionary Attacks

–countermeasures:
MFA, biometrics, limit number of attempts, force reset after too many attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacker tries a password against many different
accounts to avoid lockouts that typically come when
brute forcing a single account.
Succeeds when admin or application sets a default
password for new users.

A

Password Spraying (brute force)

–countermeasures:
MFA, CAPTCHA, password change on first login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attempts to randomly find the correct cryptographic key
attempting all possible combinations (trial and error)
Password complexity and attacker resources will determine
effectiveness of this attack.

A

Brute Force Attack

—Countermeasures:
cryptographic salts, CAPTCHA, throttling rate of repeated logins, IP blocklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which contain precomputed values of cryptographic hashfunctions to identify commonly used passwords

A

Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is random data that is used as an additional input to a one way function that hashes data, a password or passphrase.

A

Salt

–adding salts to the password before hashing them reduces effectiveness of rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MFA (something you know, have, are) prevents these attacks

A

-Phishing
-Spear Phishing
-Keyloggers
-Credential Stuffing
-Brute and reverse brute force attacks
-MITM attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a collection of compromised computing devices (often called bots or zombies).

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

criminal who uses a command
and control server
to remotely control the zombies
often use the botnet to launch attacks on other
systems, or to send spam or phishing emails

A

Bot Herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Focuses on accomplishing “smart” tasks
combining machine learning and deep
learning to emulate human intelligence

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A subset of
AI, computer algorithms that
improve automatically through experience
and the use of data.

A

Machine Learning (ML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks
Deep Learning
26
Cloud Based Attacks vs On premise Attacks
---less attacks to worry about with cloud model because data center is more secure and less vulnerable
27
attack on a cryptographic hash to find two inputs that produce the same hash value
Collision Attack --beat with collision resistant hashes
28
cryptographic attack when a protocol is downgraded from a higher mode or version to a low quality mode or lower version.
Downgrade attack --commonly targets TLS
29
an attempt to reuse authentication requests. --targets authentication (Kerberos) ---defeat with date time stamps
Replay Attack
30
attempt to find collisions in hash functions --targets digital signatures --defeat with long hash output
Birthday Attack
31
A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. Occur when an attacker uses a web application to send malicious code to a different end user. --java script and html ---uses malicious scripts identified by looking for var command and html script --