Ch 5 Key Terms Flashcards
introduce new input to exploit a vulnerability
injection attacks
ARP Poisoning
SQL injection
cross-site scripting (XSS)
injection attacks
imitates another computer’s IP address
IP spoofing
ARP Poisoning
MAC poisoning
IP spoofing
When the user is tricked into clicking a link that is other than what it appears to be
clickjacking
mousejacking
micejacking
clickjacking
uses the user’s web browser settings to impersonate that user
cross-site scripting (XSS)
cross-sit scripting (XSS)
clickjacking
cross-site request forgery (XSRF)
cross-site request forgery (XSRF)
Uses publicly accessible and open DNS servers to flood a system with DNS response traffic.
DNS attacks
cross-site scripting
DNS amplification attack
SQL injection
DNS amplification attack
a deliberate attempt to prevent authorized users from accessing a system
service of a denial
distributed deny of service
denial of service
distributed denial of service
denial of service
threat actor takes advantage of web applications that accept user input without validating it
URL hijacking
IP spoofing
cross-site request forgery (XSRF)
cross-site scripting (XSS)
cross-site scripting (XSS)
targets SQL servers by introducing malicious commands into them
integer overflow attack
SQL injection
IP spoofing
SQL injection
to illegally seize or commandeer over something and use it for nefarious reasons
hijacking
Session hijacking
SQL injection
URL hijacking
hijacking
substitues a DNS address so that the computer is automatically redirected to another device
DNS Poisoning
DNS Attack
ARP Attack
ARP Poisoning
DNS Poisoning
an attack using scripting that originates on one site to impact another site (user computer)
cross-site request forgery (XSRF)
IP spoofing
URL hijacking
cross-site scripting (XSS)
cross-site scripting (XSS)
to find the MAC address of another device based on the IP address
ARP
APR
PAR
AAR
ARP
a threat actor gains access to the domain control panel and redirects the registerd domain
domain hijacking
session hijacking
URL hijacking
DNS hijacking
domain hijacking
makes a copy of the legitimate transmission before sending it to the recipient
Replay
MITB
Repeated
MITM
Replay
when a domain pointer that links a domain name to a specific web server is changed
DNS poisoning
domain hijacking
DNS hijacking
domain hijacking