Chapter 7: Protecting Against Advanced Attacks Flashcards

1
Q

What is a Denial-of-Service (DoS)?

A

An attack that makes a service unavailable by overwhelming it with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Distributed Denial-of-Service (DDoS)?

A

A DoS attack launched from multiple systems simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Resource Exhaustion?

A

Draining a system’s resources to degrade its performance or outright cause it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Reflected DDoS?

A

A DDoS that tricks legitimate servers into flooding a target with responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Amplified DDoS?

A

A DDoS that uses small requests to trigger larger responses from servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SYN Flood?

A

A DoS attack that overwhelms a server by not completing TCP handshakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Forgery?

A

An attack that occurs when an attacker creates a fake identity, certificate, file, or other object in an attempt to fool unsuspecting users or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Spoofing?

A

An example of forgery, occurs when one person or entity impersonates someone or something else (IP Spoofing, MAC Spoofing, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is On-Path Attack? AKA man-in-the-middle attack.

A

An attack where the attacker intercepts and potentially alters communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Attacker-in-the-browser attack?

A

A malware-based attack that manipulates browser sessions in real-time, often to intercept or alter sensitive data like banking transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SSL Stripping?

A

Downgrading HTTPS to HTTP to intercept unencrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DNS Poisoning?

A

Tampering with DNS records to redirect users to fake sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Pharming Attack?

A

Redirecting users to malicious websites through DNS manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is URL Redirection?

A

Sending users to different, often malicious, websites without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Domain Hijacking?

A

Taking unauthorized control of a domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DNS Filtering?

A

Blocking harmful websites by preventing DNS resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a DNS Sinkhole?

A

A fake DNS server that traps malicious traffic for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Replay Attack?

A

Reusing captured data packets to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Credential Replay?

A

Reusing valid login credentials to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Input Validation?

A

Checking user input to prevent malicious data from entering a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some good practices when verifying user input?

A

Verifying proper characters, blocking HTML code, prevent the use of certain characters, and implementing boundary/range checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Race Conditions?

A

A flaw where two or more processes access shared data at the same time, leading to unpredictable results or vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Time of Check to Time of Use (TOCTOU)

A

A flaw where a system’s state changes between checking a condition and using it, leading to security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Error Handling?

A

The process of managing unexpected conditions in software to ensure stability and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are good examples of proper Error Handling?

A

Logging errors internally while showing generic messages to users to avoid system info exposure.

26
Q

What is Code Obfuscation?

A

A technique to make code unreadable or harder to reverse-engineer, often used to protect intellectual property.

27
Q

What is a Compiler?

A

A program that converts source code into machine-readable instructions.

28
Q

What are some potential vulnerabilities with outsourced code development?

A

Code does not perform expected tasks, code may have vulnerabilities that can be exploited, malicious code may be present, and lack of updates.

29
Q

What are some best practice headers for HTTPS?

A

HTTP Strict Transport Security, Content-Security-Policy, and X-Frame-Options.

30
Q

What is a Cookie?

A

A small file used by websites to store user session data and preferences.

31
Q

What is a Secure Cookie?

A

A cookie transmitted only over HTTPS to protection it from interception.

32
Q

What is Code Signing?

A

The process of digitally signing code to verify its integrity and source.

33
Q

What is Static Code Analysis?

A

A method to detect code issues by analyzing code without running it.

34
Q

What is a Manual Code Review?

A

A person reviewing code to catch errors or vulnerabilities.

35
Q

What is Dynamic Code Analysis?

A

Evaluating software for issues while its running.

36
Q

What is Fuzzing?

A

A method that bombards software with unexpected inputs to find security flaws.

37
Q

What is Sandboxing?

A

A security method that isolates programs in a controlled environment to prevent them from harming the system or accessing sensitive data.

38
Q

What is Package Monitoring?

A

Watching software dependencies for updates and vulnerabilities.

39
Q

What is Software Version Control?

A

A system that tracks and manages changes to source code over time.

40
Q

What is a Secure Development Environment?

A

A coding setup hardened with security measures to reduce vulnerabilities during development.

41
Q

What are the multiple stages of a good secure development environment?

A

Development, Test, Staging, Production, Quality Assurance (QA) (the process can look different across different organizations).

42
Q

What is a database?

A

A structured system for storing, managing, and retrieving data electronically.

43
Q

What is SQL?

A

A language for querying and managing data in relational databases.

44
Q

What is an SQL Query?

A

A command used to interact with and manipulate data in a database (e.g. SELECT * FROM users).

45
Q

What are Stored Procedures?

A

Precompiled SQL statements stored in a database to perform tasks and improve performance and security.

46
Q

What is an SQL Injection?

A

An attack where malicious SQL is inserted into a query to manipulate or access database data.

47
Q

What is a Memory Leak?

A

When a program doesn’t release unused memory, leading to performance issues. Can cause a system to crash.

48
Q

What is Buffer Overflow?

A

Writing more data to a buffer than it can hold, potentially causing crashes or code execution.

49
Q

What is Memory Injection?

A

A technique where malicious code is injected directly into a program’s memory to execute stealthy attacks without touching the disk.

50
Q

What is Integer Overflow?

A

When a calculation exceeds an integer’s maximum value, leading to errors and vulnerabilities.

51
Q

What are Dynamic Link Library (DLL) Injections?

A

Injecting a malicious DLL into a process to run unauthorized code.

52
Q

What is an LDAP Injection?

A

Manipulating LDAP queries to gain unauthorized access to directory services.

53
Q

What is an Extensible Markup Language (XML) Injection?

A

Injecting malicious XML into an application to change logic or access data.

54
Q

What is Directory Traversal?

A

An attack that exploits file path manipulation to access unauthorized directories or files.

55
Q

What is Cross-site Scripting?

A

A web attack where malicious scripts are injected into trusted websites.

56
Q

What is Reflected XSS/non-persistent?

A

XSS where a script is immediately reflected in a response, often via a URL. The injected script is only temporarily present.

57
Q

What is Stored XSS/persistent?

A

XSS where malicious scripts are saved on a server and executed later by other users.

58
Q

What is Script Automation?

A

Using scripts to automate tasks, often leveraged for efficiency or large-scale attacks.

59
Q

What are some common use cases for Script Automation?

A

User provisioning, Resource Provisioning, Guardrails, Ticket Creation, Escalation, Enabling/disabling services and access, Continuous integration and testing, Integration and Application Programming Interfaces (APIs).

60
Q

What are some of the benefits of Script Automation?

A

Efficiency/Saves Time, Enforces Security Baselines, Standard Infrastructure Configuration, Employee Retention, Reaction Time, And Workforce Multiplier.

61
Q

What are some considerations that should be taken when implementing Script Automation?

A

Complexity, Cost, Single Point of Failure, Technical Debt, and Ongoing Supportability.