Attacks Flashcards
utilizes deception and manipulation to perform an action or reveal information that may compromise a target.
Is one of the most popular and successful tactics used when exploiting a target.
Social Engineering
are the pathways, methods or routes used by the attacker to exploit vulnerabilities and gain access to unauthorized networks or systems, in order to deliver a payload causing harm.
While social engineering in and of itself is not inherently technical, it presents a great deal of opportunity as an ______________.
Attack vectors
is an application that is included with the Kali and ParrotOS distributions of Linux.
- The SE Toolkit contains a compilation of applications to enable target network access through various social engineering methods.
Social Engineering Toolkit (SET)
refer to websites that are popular and frequently visited
Watering hole(s)
are targeted social engineering attacks where a website is chosen due to its frequent visitors and then compromised, while the attacker waits for users to show up and to infects the sites visitors with malware.
Targets can also be lead to a watering hole as well through social engineering tactics.
Watering Hole Attacks often utilize Cross-Site Scripting and SQL Injection as a means of exploit.
Watering Hole Attacks
What application contains various scripts that enable target network access through social engineering?
SET
Watering Hole Attacks often utilize _______ and _______as a means of exploit.
Cross-Site Scripting and SQL Injection
What is a website that is targeted based on the amount of users that frequent it known as?
Water hole
___________ is a type of injection exploit, where malicious scripts are injected into a trusted website. This occurs when an attacker sends malicious code, usually as a browser side script to another user through a web application.
Cross-Site Scripting (XSS)
When an attacker conducts ____________and sends a malicious script to an end user, the browser that the end user is using, will execute the script, believing it to be legitimate.
cross-site scripting
______ exploits primarily utilize Javascript, though ______ exploits have been known to also use VBScript, ActiveX, Flash and CSS
XSS
XSS can lead to:
- Identity Theft
- Access of sensitive or restricted information
- Collection of user cookies, and user credential enumeration
- Altered browser function
XSS: There are several types of cross-site scripting, _______, ________, ______. and ________; however none of these types are absolute as there is some overlap between the two
Reflected XSS, Stored XSS, Blind XSS and DOM Based XSS
XSS: Because of the existing overlap, they have now been narrowed down into two further categories
- Server XSS
- Client XSS.
XSS: is a type of XSS where the injected script is reflected off the web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request.
Reflected XSS; is also sometimes referred to as Non-Persistent or Type-I XSS.”
XSS: When a user is tricked into clicking on a malicious link, submitting a specially crafted form, or even just browsing to a malicious site, the injected code travels to the vulnerable web site, which reflects the attack back to the user’s browser.
XSS
XSS: is a type of XSS where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc.
Stored XSS
XSS: The victim then retrieves the malicious script from the server when it requests the stored information.
Stored XSS is also sometimes referred to as ______ or ______
Persistent or Type-II XSS
XSS: defines the logical structure of documents and the way a document is accessed and manipulated
Document Object Model (DOM)
XSS: Stored XSS can be more dangerous because it?
- does not require a user to click on a malicious link, but instead to simply visit the trusted website.
- Stored XSS can be used to keylog, gather session information, or deploy malicious payloads to visiting users.
XSS: is a type of persistent XSS that typically takes place when the payload that is used by an attacker is saved on to the server and is reflected back to the victim via the backend.
Blind XSS
XSS: is a type of XSS where both the source of data is in the DOM, but the sink is also in the DOM and the data flow stays contained within the browser and never leaves.
An example of this would be the source (where malicious data is read) is a URL of a page or an element of the HTML, and the sink is a sensitive method of call which executes malicious data
Document Object Mode (DOM ) Based XSS (type 0)
XSS: exists when data that is provided by an untrusted user and is then included in an HTTP response that is generated by the server. Because the source of this data could be from either the request, or a stored location; it could be both Reflected Server XSS and Stored Server XSS.
Server XSS