Application Flashcards

Service Attacks

1
Q

Flooding a target machine or resource with many requests to overload the system and prevent use of its resources

A

DoS - Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multiple different sources attack one victim.

A

DDoS - Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The attacker alters the communication between two parties who believe that are directly communicating.

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A program attempts to write more data than can be held in fixed block of memory.

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Occurs from processing invalid data, inserts code into the vulnerable computer program and changes the course of execution.

A

Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Found in web applications, allows for an attacker to inject client side scripts in web pages

A

Cross-site scripting
XXS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unauthorized commands are sent from a user that is trusted by the website and allows attackers to steal cookies and harvest passwords.

A

Cross-site request forgery
(XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that exploits a vulnerability that allows them to gain access to resources that they normally would be restricted from accessing

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The act of falsifying the IP-to-MAC address resolution system employed by TCP/IP

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The amount of traffic sent by the attacker is originally small but then is repeatedly multiplied to place a massive strain on the victim’s resources, in an attempt to cause failure or malfunction.

A

Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type of attack that exploits vulnerabilities in the domain name system (DNS) to divert internet traffic away from legitimate servers and towards fake ones.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The act of changing the registration of a domain name with the permission of the victim.

A

Domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A proxy trojan horse that infects web browsers and captures browser session data.

A

Man-in-the-browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The aim is to exploit flaws or vulnerabilities in targeted systems that are unknown or undisclosed to the world in general. Meaning that there is no direct or specific defense to the attack; that puts most systems to become vulnerable assets at risk

A

Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network-based attack where a valid data transmission is rebroadcasted, repeated or delayed.

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication attack that captures and uses the hash of a password that the attacker attempts to log on as a user with the stolen hash

A

Pass the hash

17
Q

Pass the hash is commonly associated with the following protocol

A

Microsoft NTLM
New Technology LAN Manager

18
Q

Hijacking

Deceives the user into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legit

A

Clickjacking

19
Q

Hijacking

An attack win which an attacker attempts to impersonate the user by using their legitimate session token

A

Session hijacking

20
Q

Hijacking

Redirects the user to a false website based on misspelling the URL, and is also referred to as typosquatting.

A

URL hijacking

21
Q

hijacking

An alternate name for URL hijacking

A

Typosquatting

22
Q

Driver manipulation

The process of injecting alternate or compensation code into a system in order to alter its operations without changing the original or existing code.

A

Shimming

23
Q

Driver manipulation

Rewrites the internal processing of code without changing its behaviour

A

Refactoring

24
Q

The attacker falsifies the MAC address of a device.

A

MAC spoofing

25
Q

An intruder uses another site’s IP address to masquerade as a legitimate site.

A

IP spoofing