Attacks Flashcards
What is Social Engineering?
An attack against a user, and typically involves some form of social interaction
A training and awareness program is the best defense…
What is Phishing?
An attacker attempts to obtain sensitive information from users by masquerading as a trusted entity in an email or instant message sent to a large group of often random users
What is Spear Phishing?
A phishing attack aimed at a specific individual
What is a Whaling attack?
A phishing attack targeted against a high value target like a corporate officer or system admin
What is a Vishing attack?
A form of social engineering attack over voice lines (VoIP).
What is Tailgating?
The act of following an authorized person through a doorway without using your own credentials
What is an Impersonation attack?
A social engineering technique that can occur in person, over a phone, or online, where the attacker assumes a role that is recognized by the person being attacked, and in assuming that role, the attacker uses the potential victim’s biases against their better judgment to follow procedures
What is Dumpster Diving?
The practice of searching through trash to discover material that has been thrown away that is sensitive, yet not destroyed or shredded
What is Shoulder Surfing?
Stealing of credentials by looking over someone’s shoulder while they type them into a system
What is a Watering Hole attack?
The infecting of a specific target website, one that users trust and go to on a regular basis, with malware
What is a DoS attack?
Denial of Service (DoS)
An attack in which actions are taken to deprive authorized individuals from accessing a system, it’s resources, the data it stores or processes, or the network to which it is connected
What is a DDoS attack?
Distributed Denial of Service (DDoS)
A special type of DoS attack in which the attacker elicits the generally unwilling support of other systems to launch a many-against-one attack
What is a Man-in-the-middle attack?
Any attack that attempts to use a network node as the intermediary between two other nodes. Each of the endpoint nodes think it is talking directly to the other, but each is actually talking to the intermediary
What is Buffer Overflow?
A specific type of software coding error that enables user input to overflow the allocated storage area and corrupt a running program
What is XSS?
Cross-site Scripting (XSS)
A method of attacking a system by sending script commands to the system input and relying upon the parsers and execution elements to perform the requested scripted actions, thus instantiating the attack exploiting the trust a user has for the site
What is a Non-persistent XSS attack?
where the injected script is not persisted or stored, but rather is immediately executed and passed back via the web server
What is Persistent XSS attack?
Where the script is permanently stored on the web server or some back-end storage allowing the script to be used against others who log in to the system
What is DOM-based XSS attack?
Where the script is executed in the browser via the Document Object Model (DOM) process as opposed to the web server
What is CSRF or XSRF?
Cross-site Request Forgery (CSRF or XSRF)
A method of attacking a system by sending malicious input to the system and relying upon the parsers and execution elements to perform the requested actions, thus instantiating the attack. Exploits the trust a site has in the user’s browser