Chapter 7 - Protecting Against Advance Attacks Flashcards

1
Q

Attack Frameworks

A

Used to identify Tactics, Techniques, and procedures used by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber kill chain

A

Tactics, techniques, and procedures used to disrupt a system or network.

  1. Reconnaissance, 2. Weaponization, 3. Delivery, 4. Exploitation, 5. Installation, 6. Command and Control (C2), 7. Actions on Objectives.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reconnaissance

A

Researching and identifying a selected target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Weaponization

A

Delivering malware, via payload, such as putting a remote access Trojan into a MS Word doc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Delivery
A

Payload is delivered to target via email or usb. =

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Exploitation
A

After payload is delivered, weapon is triggered and activated to exploit a vulnerability within a application or operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Installation
A

Payload will install a remote access Trojan within the system to allow an attacker to remain present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Command and Control (C2)
A

The infected system talks back to a malicious web based server, allowing the attacker to gain full control over the effected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Actions on Objectives
A

At this point the attacker can do whatever they want. Install ransomware or steal data, or render the system useless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diamond Model of Intrusion Analysis

A

Uses four key components in attempt to understand an attacker; Adversary, capabilities, Infrastructure, and Victim.

“Every intrusion event has an adversary that uses a capability across an infrastructure against a victim.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adversary

A

Identity; user names, email address, names on forums or social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Capabilities

A

The malware, exploits and other tools used to hack and compromise the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure

A

The internet domain names, emails, ip addresses, used by the attacker(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Victims

A

Can be identified by their names, email addresses, or network identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITRE ATT&CK is a matrix of ten tactics and techniques attackers use to achieve each.

A

A matrix of ten tactics and techniques attackers use to achieve each;

initial access, execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection and exfiltration, and command and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DDoS?

A

Distributed Denial of Service (DDoS): This is when a network of bots (machines high-jacked over the internet) direct increased traffic to a target to overwhelm its servers causing resource exhaustion and making it unable to respond to legitimate clients.

17
Q

What is an SYN Flood attack?

A

SYN Flood attack: This is when a threat actor initiates a TCP 3-way handshake with the target server, first sending it an SYN packet. The targeted server responds with an AWK/SYN packet, but the threat actor never completes the handshake by sending the last AWK packet. Rather, they create this never-ending loop by sending an initial SYN packet again and the server continues to respond with an AWK/SYN. This is a DoS or DDoS attack as it looks to exhaust resources.

18
Q

What is Spoofing?

A

Spoofing is the act of impersonating someone or something else. There is MAC spoofing, this is when a threat actor uses a MAC address within the network in order to pretend they are legitimate. If this work, they are now able to receive all traffic indented for the authorized user. The same could happen with email addresses and IP addresses.

19
Q

What is an On-Path attack?

A

An On-path attack is any attack in which the threat actor is able to intercept and or eavesdrop on the communication between two communicating sources. This is also known as a man-in-the-middle attack or man-in-the-browser attack.

20
Q

What is a Secure Socket Layer (SSL) Stripping attack?

A

An SSL stripping attack is an encryption downgrade attack where a secure connection is downgraded to unsecure connection because the algorithm providing the encryption is compromised. An example of SSL stripping is turning HTTPS connections to HTTP connections.

21
Q

What is an ARP posing attack?

A

Simply put, ARP poisoning is when an illegitimate user responds to an ARP broadcast with a spoofed MAC address or a bogus one. ARP will associate the IP address with the spoofed MAC address. Now traffic for IP address will be bound for the spoofed MAC address.

22
Q

What is an ARP On-Path-Attcak?

A

An ARP On-Path-Attcak occurs after the successful poisoning of the ARP cache. The threat actor can now be on-path of communication within a network or comms leaving the network.

23
Q

What is an ARP DoS Attack?

A

An ARP DoS attack can again be carried out after a successful ARP poisoning attack. If the threat actor spoofs the MAC address of the router they can denial communications from ever leaving or entering the network.

24
Q

What is a MAC flooding attack?

A

A MAC flooding attack happens when the memory table of a switch becomes overwhelmed with new MAC addresses that it stores. After a while, the switch will have no more room to store any new MAC addresses and will start behaving like a HUB and begin broadcasting traffic to the entire network as it will be unable to direct traffic to a specific MAC address.

25
Q

What is MAC Cloning?

A

MAC cloning is replacing a system MAC address with another. Its basically like MAC spoofing.

26
Q

What is DNS Poisoning?

A

Simply put, DNS poisoning is associating an illegitimate IP address with a legitimate domain name on the DNS Server. For example, linking Google.com with my home IP address on a DNS Server. This will allow all traffic to google.com to come to my IP address.

27
Q

What is a Pharming attack?

A

Pharming attacks are used (like DNS Poisoning) to redirect users to websites they did not intend on going to. Like DNS poisoning, this can happen on a client machine or on DNS servers.

28
Q

What is URL redirection?

A

URL redirection is an attack that redirects users to different pages on a website or to a completely different site altogether.

29
Q

What is Domain Hijacking?

A

Domain Hijacking is the act of obtaining unauthorized access to a client’s domain name registration and changing the associated legitimate IP address with an illegitimate one.

30
Q

What is a DNS Sinkhole?

A

A DNS Sinkhole purposely provides incorrect results for a domain name in order to stop malicious actors from reaching a specific domain.

31
Q

What is Client-side input validation?

A

Client-side validation is the process of checking inputs on the client side before sending this imput to the server to be checked again.

Client side validation is faster than Server-side validation but it is less secure because it it be bypassed (i.e., disabling JavaScript on a web page).

32
Q

What is a Race Condition?

A

When two or more apps attempts to access the same resource at the same time a race condition occures.

33
Q

What is a TOCTOU attack aka State attack?

A

Time of Check to Time of Use attcaks occures in race conditions. This happends when at the time of check for a resource is valid but in between that time an time of check and
time of use a threat actor is able to modify the resource.

34
Q

What is the difference between Static Code and Dynanmic code analysis?

A

In Static code analysis, the manual or automated review of code is at rest. Compared to dynamic code analysis, where the code is being reviewed while it is running. For example, fuzzing is typically a method used to dynamically review code, random data is sent to an application to see how the underlying code operates.

35
Q

What are the criteria for 1NF?

A

The three criteria for First Normal Form (1NF) are:
1) Each row in the data table is unique and has a distinguishable primary key
2) Related data is contained in a separate table
3) None of the columns include repeating data from other columns

36
Q

What are the criteria for 2NF?

A

The two criteria for Second Normal Form (2NF) only apply if the primary keys are composite keys:
1) The table must be in 1NF
2) Non-primary key attributes are completely and only dependent on the full primary key

37
Q

What are the criteria for 3NF?

A

The two criteria for Second Normal Form (2NF) only apply if the primary keys are composite keys:
1) The table must be in 2NF
2) All columns that are not primary key are only dependent on the full primary key