Chapter 4 Flashcards
Man-in-the-browser
Trojan horse that intercepts data passing through the browser
Key logger
Hardware or software based to log all keystrokes
Page-in-the-middle
Redirects the request for a real website to a fictitious one
Program download substitution
Instead of the program or in addition to it the user downloads malicious software
User-in-the-middle
Puts a human in the middle of two automated process to so that the human helps with defeating a process like a CAPTCHA
Out-of-band-communication
Transferring different facts along different communication paths
Website defacement
Attacker modifies or replaces content of a legitimate website
Fake website
Impersonate the real website
Fake code
Programs that advertise one thing but do something different
Integrity checksum
A hash code which is a mathematical function that reduces a block of data to bits. Using tripwire we can check that all files match the original hash
Signed code
A digital signature can vouch for the code or data
Web content substitution
Replace some part of a website with something else that’s harmful like a PDF or toolbar
Web bug
A tiny image 1x1 pixel used for tracking across multiple domains
Clickjacking
Tricking a user into clicking a link by disguising what the link points to
Drive by download
Downloading and installing code other than what the user expects