Chapter 1 - Threats, Attacks, and Vulnerabilities Flashcards
Phishing
Social Engineering with a touch of spoofing
Usually by mail, text, etc.
Usually something wrong with the URL
Smishing (SMS Phishing)
Done by text message
Forwards links or asks for personal information
Examples: fake check, phone code verification, boss/ CEO
Vishing (Voice Phishing)
Done over the phone or voicemail
Caller ID spoofing is common
Examples: fake security checks or bank updates
Spam
Unsolicited messages
Examples: emails or forums
Mail Gateways
A filter that identifies spam and throws it away
Spam Over Instant Messaging (SPIM)
Unsolicited messages over instant messaging
Spear Phishing
Targeted phishing with inside information
Whaling
Spear phishing/ targeting the higher ups of a company
Have a ton of information for a bigger catch
Dumpster Diving
Physically going through a dumpster to find important details (for an attack) people/ companies have thrown out
Shoulder Surfing
Physically peeking over someone’s shoulder to look at their screen to try and steal information
Pharming
Redirecting a legit website to a bogus site
Harvest large group of people instead of just one person
Tailgating
Use an authorized person to gain unauthorized access to a building
Eliciting Information
Extracting information from the victim
Often used with vishing
Prepending
Add onto the beginning of a fake URL
Example: “https://pprofessormesser.com”
Identity Fraud
Someone else using your identity
Examples: credit card, bank, loan, government benefits fraud
Invoice Scams
Sending a fake invoice to the person/ department paying the bills at a company and the attacker ends up with the payment details
Credential Harvesting
Attackers collecting login credentials
Opening a document that runs a macro to start harvesting
Called password harvesting
Reconnaissance
Gather information on the victim
Usually background information
Examples: social media, corporate website
Hoax
A threat that doesn’t actually exist but seems like it COULD be real
Impersonation
Attacker pretends to be someone they are not
Uses details from reconnaissance
Watering Hole Attack
Strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware
Eventually, some member of the targeted group will become infected
Typosquatting
A type of URL hijacking
Purposely misspelling an URL
Example: “https:professormessor.com”
Pretexting
Lying to a victim to get information
Example: “Hi, we are calling from Visa regarding…”
Influence Campaigns
Sway public opinion on political and social issues
Influence Campaigns - Hybrid Warfare
A military strategy that can influence elections and fake news
Usually called cyberwarfare
Attack an entity with technology
Influence Campaigns - Social Media
Amplifying fake content on social media used by millions of people
Social Engineering Principles - Authority
The social engineer is in charge
Example: “I am calling from the off of the CEO…”
Social Engineering Principles - Intimidation
Things will be bad if you do not do this
Example: “If you don’t help me…”
Social Engineering Principles - Consensus/ Social Proof
Convince the victim based on what’s normally expected
Example: “Your co-worker, Jill, did this for me…”
Social Engineering Principles - Scarcity
The situation will not be this way for long
Example: Must make the change before time expires
Social Engineering Principles - Familiarity/ Liking
Someone you know, we have common friends
Social Engineering Principles - Trust
Someone who is safe
Example: “I am from IT, I am here to help”
Social Engineering Principles - Urgency
Paired with scarcity
Example: Act quickly, don’t think
Social Engineering Principles
Common methods used to increase social engineering for attacks
Defending Waterhole Attack
Defense in depth
Firewalls and IPS
Anti-virus/ anti-malware signature updates
Malware
Malicious software used to intend harm and gather information
Ransomware
Taking away data and requiring victim to pay to get it back
Trojans
Software that pretends to be something else to conquer your computer
Worms
Malware that self-replicates itself
Does NOT need to be executed by the user
Potentially Unwanted Programs (PUPs)
Usually downloaded by trojans
Software that a user may perceive as unwanted or unnecessary
File less Virus
A stealth attack operated in memory
Avoids anti-virus detection and is never installed in a file or application
Command and Control
Responsible for sending out commands to bots
Bots (Robots)
A type of software application or script that performs automated tasks on command
Cryptomalware
Newer generation of ransomware
Uses cryptography to encrypt victim information and sends the victim the key to decrypt if the victim sends them cryptocurrency
Logic Bombs
Waits for a predefined moment before attack is executed
Example: time, date, event
Keyloggers
A form of malware or hardware that keeps track of and records your keystrokes as you type
Remote Access Trojan (RATs)
Installed as a backdoor
Malware use to gain complete control of operating system
Rootkit
Modifies files in the foundational building blocks of the operating system (the core)
Backdoor
A new way to get into system with out going through front door and as much security
Placed on system through malware
Virus
Malware that can reproduce itself
Executed by user when a program is run
Examples: program, boot sector, script, macro viruses
Adware
Pop-ups that can cause performance issues on your device
Spyware
Malware that spies on you and everything you do
Botnets
A group of bots working together
DDoS
Spraying Attack
Attacking an account with the top three (or more) passwords
Move on if they do not work so there are no lockouts, alarms, or alerts
Dictionary Attack
Using a dictionary to find common words or wordlists
Brute Force Attack
Trying every possible password combination until the hash is met
Brute Force Attack - Online
Keep trying the login process
Very slow
Might lockout after a certain amount of attempts
Brute Force Attack - Offline
Brute forcing the hash
Get a list of users and hashes
Calculate a password hash, compare it to the stored hash
Rainbow Table
Pre-built/ calculated set of hashes
Increases speed
Plaintext/ Unencrypted
Storing passwords in the “clear”
There is no encryption and you can read the stored password
Malicious Universal Serial Bus (USB) Cable
Looks like a normal USB cable but has additional electronics inside
Human Interface Device (HID)
Downloads and installs malicious software
Malicious Flash Drive
Looks like a normal flash drive but can cause damage
Load malware documents, boot device, ethernet adapter
Card Cloning
Get card details from a skimmer
Create a duplicate of a card
Skimming
Stealing credit card information during a normal transaction
Tainted Training Data for Machine Learning (ML)
Attackers sending modified training data that causes AI to behave incorrectly
Security of Machine Learning Algorithms
Check the training data
Retrain with new data
Train the AI with possible poisoning
Evasion Attacks
Used to trick the AI into giving off confidential information
Supply Chain Attacks
Attackers can affect the supply chain by infecting different parts without suspicion
One exploit can infect the entire chain
Birthday Attack
Finding a hash collision through the effect of chance
Collision Attack
Finding two inputs producing the same hash value
Downgrade Attack
Having a system downgrade their encryption making it easy to exploit
Could use an on-path attack
Privilege Escalation
Gaining higher-level access to a system
More capabilities
Cross-Site Scripting (XSS)
Type of injection, in which malicious scripts are injected into otherwise benign and trusted websites
Non-persistent (Reflected) Cross-Site Scripting Attack
The injected malicious script is “reflected” off the web server as a response that includes some or all of the input sent to the server as part of the request
Persistent (Stored) Cross-Site Scripting Attack
Posting a message to a social network that includes a malicious payload
Posted and propagated to others
Code Injection
Adding your own information into a data stream
Structured Query Language (SQL) Injection
Inserting an SQL query into regular input or form fields in order to get credentials such as a username or password
Extensible Markup Language (XML) Injection
Modify requests and sending data and storing it in a different location
Lightweight Directory Access Protocol (LDAP) Injection
Modify requests and gaining directory information you normally would not have access to
Dynamic-Link Library Injection
Inject a DLL into an application and have that application run the code for us
Buffer Overflows
Overwriting a buffer memory and have it spill over into other memory areas
Replay Attacks
Data transfer is maliciously repeated or delayed
NOT an On-path attack
Cross-Site Request Forgery
Malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts
Pointer/ Object Dereference
Programming technique that references a portion of memory
Directory Traversal/ Path Traversal
Reading files from a web server that are outside the website’s file directory
Race Conditions
Two commands happening at the same time without being planned for
Error Handling
Giving just enough information when an error is made so an attacker exploit the system
Improper Input Handling
Finding input that can be malicious so an attack can be executed
Session Replays
Reproduction of a user’s interactions on a website or web application exactly how the user actually experienced it
Integer Overflow
When you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold
Server-Side Request Forgery
Attacker abuses the functionality of a server causing it to access or manipulate information in the realm of that server that would otherwise not be directly accessible to the attacker
Application Programming Interface (API) Attacks
The malicious usage or attempted usage of an API from automated threats such as access violations, bot attacks or abuse
Resource Exhaustion
Happens when a system or system user uses up all the available resources that the system has, leading it to be completely drained
Specialized DoS attack
Zip Bomb
Memory Leak
When unused memory is not properly released, begins to grow in size, eventually uses all available memory, and the system crashes
Secure Sockets Layer (SSL) Stripping
Combines on-path attack with a downgrade attack
Type of cyberattack in which an attacker downgrades a website from secure HTTPS to an insecure HTTP connection
Driver Manipulation
The alteration of system drivers to achieve a malicious outcome