Attack Types Flashcards

1
Q

IOC - Define

A

Indicator of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malicious Code that requires user interaction to install and replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crypto-malware/Ransomware

A

Malicious applications that scare or scam users into paying money or granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan/RAT

A

Friendly software that contains malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worms

A

Self replicating program without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Service Worms

A

Worm that exploits a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mass Mailing Worms

A

Work that spreads thorugh email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PUP

A

Potentially Unwanted Program which tend to be adware or spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless Virus

A

Malware that operates in memory. Hooks in through Powershell or WMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnet

A

Malicious Code that infects a large number of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

Malicious code that triggers after a specific time or on a date or after a specific activity etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Empire, PowerSploit, MetaSploit, Cobalt Strike

A

Fileless Attack Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Malicious software that collects user activity and reports back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger

A

Malicious code that collects all keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkits

A

Malicious code that installs at the OS or Kernal level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backdoors

A

Software that installs for the purpose of opening ports to install additional software

17
Q

Spraying

A

A form of brute force where the attacker has acquired a bunch of usernames and are testing passwords against them.

18
Q

Brute Force

A

Systematic approach of trying different passwords

19
Q

Rainbow Table

A

Precomputed table to reverse cryptographic hashes

20
Q

Dictionary Attack

A

Using known words to brute force

21
Q

Brutus, Cain and Abel, Crack, Aircrack-ng, John the Ripper

A

Dictionary attack tools

22
Q

Salting

A

Adding random data to hashing algorithm so that each hash is unique even if the same password is used twice.

23
Q

Known Plaintext/ Ciphertext

A

Access to both can allow an attacker to reveal further information like secret keys. AES is not vulnerable to this attack.

24
Q

AES

A

Advanced Standard Encryption

25
Q

Birthday Attack

A

Brute force that works on hash collisions

26
Q

Hash Collisions

A

When two different passwords accidentally have the same hash and therefore the hash can be used without knowing the password.

27
Q

Downgrade Attack

A

Forcing a system to use a lower quality mehtod of communication. Mostly in place so systems can talk to legacy systems. Used in MITM

28
Q

Adverserial AI

A

Tained data fed into machine learning system

29
Q

Supply Chain Attack

A

Attack on an organization by targeting less secure elements in a supply network

30
Q

Cloud Based Attack

A