Attacks Flashcards

1
Q

XSS

A

Cross-Site Scripting.
Attackers embed malicious HTML or javascript into a websites code. Executes when user visits the site.
Prevented with input validation techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSFR

A

Cross Site Forgery Request.
Attackers trick users into performing an action on a website. The attacker creates a specially crafted HTML link and the user performs the action without realizing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SQL Injection

A

Attacker enters additional data in the web page form to generate different SQL statements. Input validation protects gains SQL Injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disassociation Attacks

A

Wireless attack that removes a wireless client from a wireless network, forcing it to reauthenticate. Sends specially crafted traffic to a wireless client. and an access point to accomplish this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPS Attacks

A

Wi-fi protected setup attack. Keeps trying different pins that would allow the attacker access to the wireless device. Experts recommend disabling WPS on all devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rogue AP

A

An AP placed within a network without authorization. Increases vulnerabilities to the network. Can allow attacker to connect into the wired network. Used to capture and exfiltrate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evil Twin

A

Rogue AP with the same SSID as a legitimate access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jamming Attacks

A

Attackers transmit noise or another radio signal on the same frequency used by a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IV Attacks

A

Attempts to discover a pre-shared key from the IV. IV attack is successful when an encryption system reuses the same IV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bluejacking

A

Practice of sending unsolicited messages. to nearby Bluetooth devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluesnarfing

A

Unauthorized access to, or theft of information from a bluetooth advice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless Replay Attacks

A

An attacker captures data sent between two entities, modifies it, and then attempts. to impersonate one of the parties by replaying the data. WPA2 using CCMP and AES is not vulnerable to replay attacks. WPA using TKIP is vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RFID Attacks

A

Eavesdropping, Replay, and DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly