Analyzing Attacks on Computing and Network Environments Flashcards

1
Q

System Hacking Steps

A

Start with a goal > Plan the attack > Perform recon > ID potential vulnerabilities > Exploit vulnerabilities > Cover tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hybrid Password Cracking

A

Combines brute-force and dictionary attacks, modifies a word list or dictionary with common letter substitutions and appended numbers and characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rainbow Tables

A

Pre-computed passwords and hashes that can be matched to a stolen hash. Works mainly on older hashing algorithms like MD5 and SHA-1. 256-512+ bit hashes are too big, and salted hashes further reduce efficacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Masked Attack

A

Type of brute-force password cracking using wildcards for variations on common characteristics (first letter capitalized, last 4 chars are digits representing a year, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privilege Escalation

A

When a user is able to obtain access to additional resources or functionality they normally cannot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vertical Privilege Escalation

A

When a user gains additional privileges not part of their role, such as admin functions or root access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Horizontal Privilege Escalation

A

When a user accesses resources they are not entitled to, such as another user’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stored XSS Attack

A

When an attacker injects malicious code or links into a website’s forums, databases, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reflected XSS Attack

A

When an attacker crafts a form or request to be sent to a legit web server that includes malicious script, then tricks a victim into clicking a link to send that malicious request to the web server, which is then reflected back and executes in the victim’s browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DOM-based XSS Attack

A

When malicious scripts take advantage of a web app’s client side implementation of JavaScript to execute the attack solely on the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XSRF/CSRF Attack

A

Exploits trust between browser and persistent cookies, which store authentication data, allowing the attacker to trick the user into unwittingly completing a task on their behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command Injection

A

An attack that introduces malicious code into a vulnerable application to compromise the security of the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL Injection

A

A type of command injection attack using SQL syntax directed at a server by accessing the client side of the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Parameterized Queries / Prepared Statements

A

SQL Injection defense, incorporates placeholders into backend queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory Traversal

A

Accessing a file from a location the user is not allowed to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote File Inclusion

A

Attacker uses a script to inject a file into a web app or site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Local File Inclusion

A

Attacker adds a file to the web app or site that already exists on the hosting server, such as cmd.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Session Fixation

A

Web attack forcing a user to browse a website in the context of a known and valid session

19
Q

Session Prediction

A

Web attack focusing on identifying weaknesses in session token generation that will allow an attacker to predict future session values

20
Q

Clickjacking

A

Web attack where an attacker tricks a client into clicking a web page that is different from where they had intended to go, usually using iframes

21
Q

Cookie Hijacking

A

Web attack where an attacker intercepts a cookie to inject malicious code that they can use to take control of the session

22
Q

Cookie Poisoning

A

Web attack where the contents of a cookie are modified to be used to exploit vulnerabilities in the web app

23
Q

Virus

A

A piece of code that spreads from one computer to another by attaching itself to other files to replicate. Requires human intervention to spread.

24
Q

Worm

A

Self-replicating malware. Does not need human interaction, does not attach to files

25
Q

Adware

A

Software that automatically displays or downloads advertisements

26
Q

Spyware

A

Secretly installed malicious software intended to track and report usage or collect data

27
Q

Trojan Horse

A

Hidden malware that causes damage to a system or gives an attacker a platform for monitoring or controlling a system, typically appearing as harmless software

28
Q

Rootkit

A

Code intended to take full or partial control of a system at the lowest level, often hidden from system processes

29
Q

Logic Bomb

A

A piece of code that sits dormant on a system until triggered when certain conditions are met, then performs some desired action

30
Q

Ransomware

A

Code that restricts access to a victim’s files until a ransom is paid

31
Q

Malvertisement

A

Malicious code delivered through advertisements

32
Q

Polymorphic Virus

A

An encrypted virus that changes its own decryption module to avoid signature-based detection

33
Q

Armored Virus

A

Obscures location within a system and contains obfuscated code to make it difficult to find and eradicate

34
Q

ARP Spoofing/Poisoning

A

When an attacker redirects an IP address to a MAC address that was not its intended destination

35
Q

DNS Poisoning

A

An attacker is able to modify a DNS server cache so it returns a fraudulent IP address to the user

36
Q

DNS Hijacking

A

An attacker modifies a computer’s DNS config to point to a rogue DNS server controlled by the attacker

37
Q

ICMP Redirect

A

A network transmission that informs a host that a better routing path is avialable. Can be spoofed to redirect the host along a malicious path. Takes advantage of Type 5 control message for ICMP

38
Q

DHCP Spoofing

A

When an attacker responds to a host request for address assignment before the legitimate DHCP server can

39
Q

NBNS Spoofing

A

When an attacker responds to a request for name service resolution over NetBIOS

40
Q

ICMP Flood

A

DoS attack where high volumes of ICMP packets are sent to a target, aka Smurf attacks or ping flood

41
Q

UDP Flood

A

DoS attack where the attacker sends a high volume of UDP ping requests, usually spoofing the source IP which results in the spoofed IP getting Dos’d

42
Q

SYN Flood

A

DoS attack where the attacker sends lots of TCP connection requests. For each SYN-ACK the server responds with, it creates memory space for the session, and eventually runs out of memory due to incomplete TCP connections

43
Q

Buffer Overflow

A

When too much data is sent to a fixed-length memory buffer, resulting in adjacent areas of memory being overwritten

44
Q

Reflected DoS Attack

A

When a spoofed source IP sends requests to a large number of computers, and they all send responses to the spoofed IP, overwhelming the real machine at that IP