Attacks, Viruses And Threats Flashcards
Attackers take control of the database by entering SQL into the input boxes on a website instead of entering basic text - application layer
SQL Injection
Attackers enter too much information into the form which causes the app to crash or other damages. - application layer
Buffer overflow
Impersonates both the sender & the receiver to intercept communication between two systems. - Various Layers
Man in the Middle
An attacking host on a VLAN gains access to traffic on other VLANs that would normally not be accessible. - Data Link Layer
VLAN Hopping
Denying service to a computer, network or network server by overwhelming the victim with large amounts of useless traffic. - Transport
Denial of Service
Where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations. - transport
Distributed Denial of Service - DDoS
Attacker pings the target & send a ICMP packer over the max of 65,535 bytes and causes the victims system to crash or stop functioning. Causes buffer overflow and crashes - Network
Ping of Death
Information gathering technique which is used to identify live hosts by pinging them. After the sweep, the attacker overwhelms them with a large amount of ICMP echo-request packets (ping) - Network
Ping Flood
Rather than one computer sending ICMP packets, multiple computers are replying to the ICMP packet. - network & transport
SMURF DDoS
A DoS attack where the attacker can force any client or even every client off of the network. - Presentation
Deauthentication - Deauth Attack
User clicks on a link to a nefarious site which tricks them into entering their name/email addresses or other secure info.
Phishing
Targets a person with extremely specific information
Spear Phishing
Attacks itself to a file or host
Viruses
Do not attach to a host file, they are self/contained programs.
Worms
Hides in a useful program
Trojans