Analyzing Attacks on Computing and Network Environments Flashcards

1
Q

System Hacking Steps

A

Start with a goal > Plan the attack > Perform recon > ID potential vulnerabilities > Exploit vulnerabilities > Cover tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hybrid Password Cracking

A

Combines brute-force and dictionary attacks, modifies a word list or dictionary with common letter substitutions and appended numbers and characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rainbow Tables

A

Pre-computed passwords and hashes that can be matched to a stolen hash. Works mainly on older hashing algorithms like MD5 and SHA-1. 256-512+ bit hashes are too big, and salted hashes further reduce efficacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Masked Attack

A

Type of brute-force password cracking using wildcards for variations on common characteristics (first letter capitalized, last 4 chars are digits representing a year, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privilege Escalation

A

When a user is able to obtain access to additional resources or functionality they normally cannot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vertical Privilege Escalation

A

When a user gains additional privileges not part of their role, such as admin functions or root access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Horizontal Privilege Escalation

A

When a user accesses resources they are not entitled to, such as another user’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stored XSS Attack

A

When an attacker injects malicious code or links into a website’s forums, databases, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reflected XSS Attack

A

When an attacker crafts a form or request to be sent to a legit web server that includes malicious script, then tricks a victim into clicking a link to send that malicious request to the web server, which is then reflected back and executes in the victim’s browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DOM-based XSS Attack

A

When malicious scripts take advantage of a web app’s client side implementation of JavaScript to execute the attack solely on the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XSRF/CSRF Attack

A

Exploits trust between browser and persistent cookies, which store authentication data, allowing the attacker to trick the user into unwittingly completing a task on their behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command Injection

A

An attack that introduces malicious code into a vulnerable application to compromise the security of the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL Injection

A

A type of command injection attack using SQL syntax directed at a server by accessing the client side of the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Parameterized Queries / Prepared Statements

A

SQL Injection defense, incorporates placeholders into backend queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directory Traversal

A

Accessing a file from a location the user is not allowed to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote File Inclusion

A

Attacker uses a script to inject a file into a web app or site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Local File Inclusion

A

Attacker adds a file to the web app or site that already exists on the hosting server, such as cmd.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Session Fixation

A

Web attack forcing a user to browse a website in the context of a known and valid session

19
Q

Session Prediction

A

Web attack focusing on identifying weaknesses in session token generation that will allow an attacker to predict future session values

20
Q

Clickjacking

A

Web attack where an attacker tricks a client into clicking a web page that is different from where they had intended to go, usually using iframes

21
Q

Cookie Hijacking

A

Web attack where an attacker intercepts a cookie to inject malicious code that they can use to take control of the session

22
Q

Cookie Poisoning

A

Web attack where the contents of a cookie are modified to be used to exploit vulnerabilities in the web app

23
Q

Virus

A

A piece of code that spreads from one computer to another by attaching itself to other files to replicate. Requires human intervention to spread.

24
Q

Worm

A

Self-replicating malware. Does not need human interaction, does not attach to files

25
Adware
Software that automatically displays or downloads advertisements
26
Spyware
Secretly installed malicious software intended to track and report usage or collect data
27
Trojan Horse
Hidden malware that causes damage to a system or gives an attacker a platform for monitoring or controlling a system, typically appearing as harmless software
28
Rootkit
Code intended to take full or partial control of a system at the lowest level, often hidden from system processes
29
Logic Bomb
A piece of code that sits dormant on a system until triggered when certain conditions are met, then performs some desired action
30
Ransomware
Code that restricts access to a victim's files until a ransom is paid
31
Malvertisement
Malicious code delivered through advertisements
32
Polymorphic Virus
An encrypted virus that changes its own decryption module to avoid signature-based detection
33
Armored Virus
Obscures location within a system and contains obfuscated code to make it difficult to find and eradicate
34
ARP Spoofing/Poisoning
When an attacker redirects an IP address to a MAC address that was not its intended destination
35
DNS Poisoning
An attacker is able to modify a DNS server cache so it returns a fraudulent IP address to the user
36
DNS Hijacking
An attacker modifies a computer's DNS config to point to a rogue DNS server controlled by the attacker
37
ICMP Redirect
A network transmission that informs a host that a better routing path is avialable. Can be spoofed to redirect the host along a malicious path. Takes advantage of Type 5 control message for ICMP
38
DHCP Spoofing
When an attacker responds to a host request for address assignment before the legitimate DHCP server can
39
NBNS Spoofing
When an attacker responds to a request for name service resolution over NetBIOS
40
ICMP Flood
DoS attack where high volumes of ICMP packets are sent to a target, aka Smurf attacks or ping flood
41
UDP Flood
DoS attack where the attacker sends a high volume of UDP ping requests, usually spoofing the source IP which results in the spoofed IP getting Dos'd
42
SYN Flood
DoS attack where the attacker sends lots of TCP connection requests. For each SYN-ACK the server responds with, it creates memory space for the session, and eventually runs out of memory due to incomplete TCP connections
43
Buffer Overflow
When too much data is sent to a fixed-length memory buffer, resulting in adjacent areas of memory being overwritten
44
Reflected DoS Attack
When a spoofed source IP sends requests to a large number of computers, and they all send responses to the spoofed IP, overwhelming the real machine at that IP