Cheat Sheet Flashcards

1
Q

Virus

A

replicates using port 1900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Polymorphic virus

A

mutates, as does its hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomware

A

asks for money; could be subtle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worm

A

spreads using port 5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

could change .dll files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

upon reinstalling the OS, it is still there; in Linux, look for the bash shell as a path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keylogger

A

logs keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A

uses popups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bots

A

infected machine used as an attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

sends back passwords to the hacker, who then logs in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic bomb

A

needs a trigger, such as time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

uses email; targets one person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear phishing

A

attacks a group; look for plurals in the question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whaling

A

attacks CEO or high‐level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vishing

A

uses a telephone or leaves a voicemail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailgating

A

follows someone through; does not use credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Impersonating

A

pretends to be from the help desk or IT team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dumpster diving

A

pulls information from the trash bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Shoulder surfing

A

someone looks over an employee’s shoulder or uses a smartphone to video your bank transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Watering hole

A

infects a trusted website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authority

A

email from CEO or HR; asks you to fill in a form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Urgency

A

letting a fireman into the server room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DoS

A

one host taking out another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DDoS

A

multiple hosts taking out one host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Man‐in‐the middle
interception attack data in real time
26
Replay
interception attack data replayed at a later date
27
Kerberos
prevents replay and pass‐the‐hash attacks
28
Buffer overflow
too much data in a field
29
Integer overflow
too large a number in a data field
30
XSS
uses HTML tags/JavaScript; no authentication
31
XSRF/CSRF
asks you to click on an icon and provide authentication
32
Privilege escalation
tries to get admin rights
33
ARP poisoning
prevented by using static entries in the arp cache—for example, arp ‐s
34
DNS poisoning
prevented by using DNSSEC that produces RRSIG records
35
ARP
local LAN attack
36
Man‐in‐the‐browser
trojan already installed; after bank transactions; URL does not change
37
Zero‐day virus
cannot be detected other than baseline; takes more time to get antidote.
38
Pass‐the‐hash
attacks NTLM authentication; prevented by disabling NTLM or using Kerberos
39
Session hijacking
steals your cookies
40
Evil twin
looks like a legitimate WAP
41
Rogue AP
free; steals information; prevented by using 802.1x
42
Jamming
interference attack
43
WPS
push the button; brute-force attacks underlying password
44
Bluejacking
hijacks Bluetooth phone; sends text messages
45
Bluesnarfing
steals contacts from Bluetooth phone
46
RFID
prevents theft of small devices
47
NFC
wireless payment; short range
48
Birthday
hash-collision attack; digital signatures vulnerable
49
Disassociation attacks
prevents access to the WAP
50
Rainbow tables
precomputed list of passwords and hashes; used for hash-collision attacks
51
Dictionary
password; prevented by using a random character in your password or misspelling your password
52
Brute force
every available combination; prevents account lockout low value or salt password
53
Collison
matches hashes
54
Weak implementation
uses WEP; better to use WPA2‐CCMP as it is the strongest
54
Downgrade
uses legacy SSL rather than TLS; POODLE is a classic example
55
Script kiddie
purchases scripts and programs, probably from the dark web
56
Hacktivist
politically motivated agent
57
Nation state/APT
foreign government agent
58
Organized crime
profit-driven agent who will blackmail you
59
Competitors
steals your trade secrets; beats you to market with your product
59
Insider
known as a malicious insider; hardest to detect
60
Intrusive
can cause damage
61
Black box
knows nothing
62
White box
knows everything
63
Gray box
has at least one piece of information—for example, a password or diagram
64
Fuzzing
enters random characters into an application for spurious results; black-/white-box pen testers use it
65
Pivot
accesses a network through a vulnerable host, then attacks a secondary, more important host
66
Initial exploitation
where pen testing starts
67
Escalation of privileges
obtains admin rights
68
Intrusive scan
used in pen testing; can cause damage to your system
69
Passive
no damage
70
Credentialed
admin rights; more information; audit files; account and certificate information
71
Non‐credentialed
low level; finds missing patches
72
Race condition
two threads accessing data at the same time
73
End‐of‐life systems
lack of vendor support; no patches
74
Error handling
customer side makes error small; IT support error needs all information
75
Default configuration
changes username or passwords
76
Untrained users
not complying with policies
76
Resource exhaustion
running CPU at 100% or running out of memory
77
Key management
ensures keys signed in and out each day