ch 5 Flashcards

1
Q

Three most common attacks are
Man in the middle
Man in the browser
Replay attacks what are these classified as?

A

Interception attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two computers are sending and receiving data with a computer between them.

A

(MITM) Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs between a browser and the underlying computer.

Usually begins with a Trojan infecting the computer and installing an “extension” into the browser configuration.

A

(MITB) man in the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attacker makes a copy of transmission before sending it to the original recipient.
Preventing replay attacks, both sides can communicate and negotiate a random key. Use timestamps in all messages and reject all message that fall outside of the time.

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of introducing a substance that harms or destroys.

Three types of attacks that inject “poisoning”

A

Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Address resolution protocol, if the IP address for a device is known but the MAC address is not, the sending computer sends the ARP packet to determine the MAC address.
Relies upon Mac Spoofing

A

ARP Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domain name system is the current basis for name resolution to the IP address.
Two locations for DNS poisoning / Local host table / external DNS server.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

exploiting a software vulnerability to gain access to resources that the user normally would be restricted from accessing.

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

when a lower privilege user access functions restricted to higher privilege users.

A

Vertical privilege escalation-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

User restricted privilege access different restricted functions of a similar user.

A

Horizontal privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compromised server can provide threat actor’s with its privileged contents to provide an opening for attacking any of the devices that access that server.

A

Server attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

deliberate attempt to prevent authorized users from accessing a system by overwhelming it with requests.

A

(DoS) Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using hundreds of thousands of devices flooding the server with requests.

A

(DDoS) distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attack broadcasts a network request to all the computers on the network but changes the address from which the request come from IP Spoofing.

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– floods victims by redirecting valid responses to it.

A

DNS amplified attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Takes advantage of procedures for initiating a session.

A

SYN flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– an attack that exploits previously unknown vulnerabilities, victims have not time to prepare for or defend against the attack.

A

Zero Day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat actor takes advantage of web applications that accept user input without validating it before presenting it back to the user.

A

Cross- site Scripting (XSS) attack

19
Q

This attack uses the user’s web browser settings to impersonate that user.

A

(XSRF) Cross-site Request Forgery

20
Q

introduce new input to exploit a vulnerability.

A

Injection attacks

21
Q

used to view and manipulate data stored in relational database.

A

(SQL) Structured Query Language

22
Q

Several server attacks are the result of threat actors “commandeering” a technology and then using it for an attack.

A

Hijacking

23
Q

Attacker attempts to impersonate user by stealing or guessing session token.
An attacker can attempt to obtain attacks to obtain the session token.
By using XXS or other attacks in order to steal the session token from someone’s computer.

A

Session Hijacking

24
Q

Users are directed to a fake look alike site filled with ads for which the attacker receives money for traffic generated to the site.

A

URL Hijacking (also called Typo Squatting)

25
Q

Registering Domain names that are one bit different.

A

Bit squatting-

26
Q

Occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor.

A

Domain Hijacking

27
Q

Hijacking a mouse click, User tricked into clicking a link that is other that what is appears to be.

A

Clickjacking

28
Q

– Designed to “overflow” areas of memory with instructions from the attacker.

A

Overflow Attacks

29
Q

Occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

A

Buffer Overflow attacks

30
Q

Result of an arithmetic operation exceeds the maximum size of the integer type used to store it.

A

Integer overflow

31
Q

An attacker changes the value of a variable to something put outside the range that the programmer had intended by using an integer overflow.

A

Integer overflow Attack

32
Q

Several attacks to use ads or manipulate the advertising system.

A

Advertising Attacks

33
Q

– Threat actors use third- party advertising networks to distribute malware to unsuspecting users who visit a well-known site.

A

malvertising

34
Q

Threat actors manipulate pre-roll ads to earn ad revenue that is directed back to them.

A

Ad Fraud

35
Q

Web browser additions have introduced vulnerabilities in browsers that access servers.

A

Browser vulnerabilities

36
Q

– Expand the normal capabilities of a web browser

A

Extensions

37
Q

Adds new Functionality to a web browser so users can play music, new videos, or display special graphical images (java, adobe Flash Player, Apple Quicktime, and Adobe acrobat reader)

A

Plug-in

38
Q

Add a Greater degree of functionality to the web browser.

A

Add-Ons

39
Q

what is

whatever’ AND email is NULL;–

A

determine the name of different fields in the database

40
Q
what is 
(whatever' AND 1=(select COUNT (*)FROM tabname);--)
A

discover the name of the table

41
Q

what is

whatever’ OR full name LIKE Mia)

A

find specific users

42
Q

what is

whatever’; DROP TABLE members; –

A

erase the database table

43
Q

whatever’; UPDATE members SET email= ‘attacker-email@evil.net’ WHERE email = ‘Mia@good.com

A

Mail password to attackers email account