Attacks Flashcards

Attacks

1
Q

Zero-day vulnerability

A

Zero-day vulnerability- vulnerability known before patch is available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero-day exploit

A

Zero-day exploit- refers to existence of exploit code for a vulnerability that has yet to be patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session hijacking

A

Session hijacking- seizing control of an existing network session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MITM

A

MITM (Man/monkey in the middle)- places attacker between the system and the victim
o Attacker spoofs (masquerades as endpoint), sniffing traffic, then inserts a malicious system into the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

Virus- A piece of malicious code that often attaches onto executable code. Needs a host in which to live, and an action by the user to spread.
o Macro virus- macro language; eg MS Doc
o Boot sector virus- loads at startup
o Stealth virus- hides itself
o Polymorphic virus- changes its signature on infection
o Multipartite virus- spreads via multiple vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm

A

Worm- self propogate and spread without user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan Horse

A

Trojan Horse- provides user with a desired functionality as well as an unknown malicious functionality. It often provides a persistent backdoor access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkits

A

Rootkits- designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer;
replaces portions of the kernel or OS;
user-mode rootkit operates in ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS

A

DoS Denial of Service: The purpose of these attacks is to overwhelm a system and disrupt its availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS

A

DDoS Distributed Denial of Service: Characterized by the use of Control Machines (Handlers) and Zombies (Bots).
An attacker uploads software to the control machines, which in turn commandeer unsuspecting machines to perform an attack on the victim.
The idea is that if one machine initiating a denial of service attack, then having many machines perform the attack is better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Land attack

A

LAND (Local Area Network Denial) attack is a DoS attack that consists of sending a special poison spoofed SYN packet where source and destination are the same to a computer, causing it to lock up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SMURF

A

SMURF: A variation of the ICMP flood attack where Echo Requests with the intended victim’s spoofed source IP are broadcast to a computer network using an IP Broadcast address.
Counter Measures:- Disabled ICMP on perimeter systems.- Use packet filtering and stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Syn Flood

A

Syn Flood: Type of attack that exploits the three way handshake of TCP (SYN, SYN-ACK, ACK). Layer 4 attack.
Stateful firewall is needed to prevent; Limit the allowed number of half-open; connections; Reduce amount of time before half-open connections are purged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fraggle

A

Fraggle: Similar to Smurf, but uses UDP instead of ICMP. Layer 4 attack.
Mitigate by blocking distributed broadcasts on routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP Flood

A

ICMP Flood: Large numbers of ICMP packets are sent to the target to consume resources.
Counter Measures: ICMP should be disabled across perimeter systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Teardrop

A

Teardrop Attack: The length and fragmentation offset fields of sequential IP packets are modified, causing the target system to become confused and crash.
Can also be used to let one fragment overlap another and change the TCP header which can be used to change the connection type from HTTP to Telnet, for example.
Counter measure: Employ filter device that performs virtual packet reassembly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ping of death

A

Ping of death- malformed ICMP echo request that is larger than Maximum Transmission Unit (MTU) size of IP packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ping Flooding

A

Ping Flooding: Overwhelming a system with a multitude of pings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Buffer Overflow

A

Buffer Overflow: Attacks that overwhelm a specific type of memory on a system’s buffers.
Is best avoided with input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bonk

A

Bonk : Similar to the Teardrop attack. Manipulates how a PC reassembles a packet and allows it to accept a packet much too large

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

UDP Flood

A

UDP Flood: Large numbers of UDP packets are sent to the target to consume resources.
Counter Measures: Using a router to filter UDP and drop UDP traffic if UDP is not a required service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS reflection

A

DNS reflection- (like smurf) leverages third party; directs many poorly configured DNS servers to query an attacker controlled DNS, causing the third-party DNS to cache large DNS records. Attacker then requests all large DNS query records be sent to the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Steganography

A

Steganography: Attempts to conceal data by hiding it. Used by placing information in graphics, sound files or document headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Password Cracking types

A

Password Cracking
o Dictionary attack- try common passwords
o Brute force- all combinations
o Hybrid attack- combination
o LanMan hashes- compromised MS hashing function
o Rainbow tables- matches hashes to passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Chosen plaintext attack

A

A cryptanalyst ‘chooses’ the plaintext to be encrypted in a chosen plaintext attack; the goal is to derive the key. Encrypting without knowing the key is done via an encryption oracle (a device that encrypts without revealing the key).
Adaptive-chosen plaintext begins with a chosen plaintext attack in round 1. The cryptanalyst then adapts further rounds of encryption based on the previous round.

26
Q

Known plaintext attack

A

A known plaintext attack relies on ‘recovering’ and analyzing a matching plaintext and ciphertext pair. The goal is to derive the key that was used.

27
Q

Known key attack

A

Known key means the cryptanalyst ‘knows something about’ the key, to reduce the efforts used to attack it

28
Q

Chosen ciphertext attack

A

Chosen ciphertext attacks chooses the ciphertext to be decrypted.
This attack is usually launched against ‘asymmetric’ cryptosystems, where the cryptanalyst may choose public documents to decrypt that are signed (encrypted) with a user’s public key.
Adaptive Chosen Ciphertext begins with a chosen ciphertext attack in round 1. The cryptanalyst then adapts further rounds of decryption based on the previous round.

29
Q

Meet-in-the-middle attack

A

A meet-in-the-middle attack encrypts on one side, decrypts on the other side, and meets in the middle.
The most common attack is against double DES, which encrypts with two keys in encrypt, encrypt order.
The attack is a known plaintext attack- the attacker has a copy of a matching plaintext and ciphertext and seeks to recover the two keys used to encrypt.

30
Q

Birthday attack

A

The birthday attack is used to create hash collisions. Matching any birthday is easier than matching a specific birthday => finding any input that creates a colliding hash with any other input is easier.

31
Q

Side-channel attack

A

Side-channel attacks use physical data to break a cryptosystem, such as monitoring CPU cycles or power consumption used while encrypting or decrypting

32
Q

Dictionary attack

A

Dictionary attack- is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password

33
Q

Brute force attack

A

Brute force attack- every possible password combination is tried

34
Q

Rainbow tables

A

Rainbow tables- is a precomputed table of plaintext passwords and hashes used for lookup when cracking password hashes.

35
Q

Hybrid attack

A

Hybrid attack- changes characters in dictionary words before hashing

36
Q

Black hat

A

Black hat- malicious hackers, or crackers

37
Q

White hat

A

White hat- ethical hackers that perform penetration testing

38
Q

Gray hat

A

Gray hat- not malicious, exploits to bring weakness to attention

39
Q

Script Kiddies

A

Script Kiddies- attack with tools they have little/no understanding of

40
Q

Outsiders

A

Outsiders- unauthorized attackers with no privileges

41
Q

Insiders

A

Insiders- internal user who intentionally or accidentally attacks a system; cause most high-impact incidents

42
Q

Hactivist

A

Hactivist- attacks for political reasons

43
Q

Bots & Botnets

A

Bots & Botnets- bot (aka zombie) is system running malware controlled via botnet managed by bot herders (humans)
o Systems become bots after infection via server or client side attack, trojans, etc.
o Botnets often use IRC (Internet Relay Chat), HTTPS, HTTP for command and control

44
Q

Phishing

A

Phishers- attacker tricks user into divulging info (credentials) via mass social engineering

45
Q

Spear phishing

A

Spear phishing- is more targeted social engineering attacks (aka whale hunting, whaling)

46
Q

Vishing

A

Vishing- attack using phone system

47
Q

Logic Bomb

A

Logic Bomb: A type of malicious code that lays dormant until a logical event occurs

48
Q

Back Door Programs

A

Back Door Programs: A Program that allows access (often administrative access) to a system that bypasses normal security controls.

49
Q

Salami

A

Salami: Many small attacks add up to equal a large attack

50
Q

Data Diddling

A

Data Diddling: Altering/Manipulating data, usually before entry

51
Q

Sniffing

A

Sniffing: Capturing and Viewing packets through the use of a protocol analyzer. Best defense: Encryption

52
Q

Session Hijacking

A

Session Hijacking: Where an attacker steps in between two hosts and either monitors the exchange, or often disconnects one.
Session hijacks are types of MITM.
Encryption prevents sniffing and mutual authentication would prevent a session hijack

53
Q

Session Spoofing

A

Session Spoofing: Altering a TCP packet so that it appears to be coming from a known, trusted source, thus giving the attacker access to the trusted network

54
Q

War dialing

A

War dialing: An attack on a RAS (Remote Access Server) where the attacker tries to find the phone number that accepts incoming calls.
RAS should be set to use caller ID (can be spoofed), callback (best), and configured so that modem does not answer until after 4 calls.

55
Q

Foot Printing

A

Foot Printing - Probes for Network Information: Includes PING sweeps, port scanning DNS information gathering

56
Q

Masquerading attack

A

Masquerading attack: (aka ARP table poisoning) An attacker alters a system’s ARP table so that it contains incorrect information.

57
Q

DNS Poisoning

A

DNS Poisoning: Altering a DNS cache so as to redirect traffic. Is used to spoof a legitimate website so as to capture sensitive information or for denial of service

58
Q

LOKI

A

LOKI: sending extra data in ICMP messages (covert channel)

59
Q

Packers

A

Packers- used to shrink the size of the executable

60
Q

Replay Attack

A

Replay Attack: An attacker capturing the traffic from a legitimate session and replaying it to authenticate his session. In a web application, if the attacker can gain access to the authentication cookie in use by another user, they can impersonate that user.

61
Q

Race Condition

A

Race Condition: time of check is different from time of use (TOCTOU)