Chapter 14 Flashcards
Social engineering
The practice of exploiting people to gain access to unauthorized areas and systems.
Phishing
An attack that uses a malicious email crafted to look legitimate. The intent is to have a user click a link to a malicious website or download a malicious file.
Spear phishing
A phishing attack that is designed to target a specific person.
Vishing
A social engineering attack in which the hacker attempts to get sensitive information from a user over the phone.
Shoulder surfing
A social engineering attack in which the hacker gathers sensitive information by looking over a target’s shoulder while the target is working on a computer.
Tailgating
A social engineering attack that allows the hacker to bypass access control systems by closely following a legitimate user into a building.
Impersonation
A social engineering attack in which the hacker attempts to gain access to the building by pretending to be a legitimate or authorized person.
Dumpster diving
A social engineering attack in which the hacker goes through the trash to find sensitive information.
Evil twin
A rogue access point that is configured to mimic a legitimate wireless network.
Denial of service (Dos)
An attack that is designed to overload the target with more data than it can handle, causing it to shut down. A distributed denial of service (DDoS) attack uses multiple computers to carry out the attack.
SQL injection
An attack designed to target databases.
Cross-site scripting (XSS)
An attack designed to target improperly configured input fields on a website.
On-path attack
An attack in which the attacker intercepts a communication. The attacker may obtain data from and/or manipulate the data before sending it to the intended recipient.
Brute force attack
A password cracking attack in which the attacker attempts to guess passwords by using a cracking tool that submits every possible letter, number, and symbol combination.
Dictionary attack
A password cracking attack in which the attacker uses a list of words and phrases to guess the decryption key.
MAC spoofing
A network attack in which the MAC address of the hacker’s computer is changed to match the network’s gateway and overwrite the switch’s CAM table to intercept all communications.
Zero-day attack
Any attack that exploits a vulnerability that the developer is not aware of yet.
Operating system end of life
An operating system that is no longer supported by the vendor.
Bring Your Own Device (BYOD)
A policy that allows users to use their own personal devices for work purposes.
Whaling
A spear phishing attack that is designed to target a high-level employee, such as a CEO.
SYN flood
The attacked sends a bunch of SYN packets with a spoofed IP address. When the target responds with the SYN-ACK packet, it sends it to the wrong IP address, which means no response will come back. The target eventually gets overwhelmed waiting for the response packets.
Amplification attack
Consumes the bandwidth between the target and the internet, effectively cutting them off. DNS amplification attacks are a common example of this. Basically, the attacker sends a large amount of DNS queries to multiple open DNS servers with the victim’s IP address spoofed as the sender. The DNS servers will send the DNS responses back to the victim, which can quickly overload them.