Cheat Sheet Flashcards
Virus
replicates using port 1900
Polymorphic virus
mutates, as does its hash value
Ransomware
asks for money; could be subtle
Worm
spreads using port 5000
Trojan
could change .dll files
Rootkit
upon reinstalling the OS, it is still there; in Linux, look for the bash shell as a path
Keylogger
logs keystrokes
Adware
uses popups
Bots
infected machine used as an attack vector
RAT
sends back passwords to the hacker, who then logs in
Logic bomb
needs a trigger, such as time
Phishing
uses email; targets one person
Spear phishing
attacks a group; look for plurals in the question
Whaling
attacks CEO or high‐level executives
Vishing
uses a telephone or leaves a voicemail
Tailgating
follows someone through; does not use credentials
Impersonating
pretends to be from the help desk or IT team
Dumpster diving
pulls information from the trash bin
Shoulder surfing
someone looks over an employee’s shoulder or uses a smartphone to video your bank transaction
Watering hole
infects a trusted website
Authority
email from CEO or HR; asks you to fill in a form
Urgency
letting a fireman into the server room
DoS
one host taking out another
DDoS
multiple hosts taking out one host
Man‐in‐the middle
interception attack data in real time
Replay
interception attack data replayed at a later date
Kerberos
prevents replay and pass‐the‐hash attacks
Buffer overflow
too much data in a field
Integer overflow
too large a number in a data field
XSS
uses HTML tags/JavaScript; no authentication
XSRF/CSRF
asks you to click on an icon and provide authentication
Privilege escalation
tries to get admin rights