CHP 13 Flashcards
WMI
Windows Management Instrumentation (WMI)
VBA
Visual Basic for Applications (VBA)
DLL
A Dynamic Link Library (DLL) is a file used in Windows operating systems that contains code and data that can be used by multiple programs simultaneously.
Third Party Cookies
third-party cookies can be used to record web activity, track the user’s IP address, and harvest various other metadata, such as search queries and information about the browser software and configuration.
Super Cookie
A supercookie is a type of tracking mechanism used by websites and advertisers to collect information about your online activities. Unlike regular cookies, which are stored in your web browser and can be easily deleted or blocked, supercookies use less obvious methods to track you, making them harder to detect and remove.
A Beacon
A beacon, often referred to as a web beacon or tracking pixel, is a small, invisible image embedded into a website or an email. It’s typically just 1x1 pixel in size, making it virtually undetectable to users. Despite its tiny size, it plays a significant role in tracking and collecting data about user interactions.
Spyware technique
another spyware technique is to perform DNS redirection to pharming sites.
UAC
User Account Control (UAC) is a security feature in Windows that helps prevent unauthorized changes to the operating system.
Concurrent Session Usage
A potential indicator of malicious activity where an account has started multiple sessions on one or more hosts.
SYN Flood Attack
A DoS attack where the attacker sends numerous SYN requests to a target server, hoping to consume enough resources to prevent the transfer of legitimate traffic.
Think “Too many handshakes for the computer to handle”
Asymmetric Threat
An asymmetric threat is a type of security challenge where a threat actor (like a hacker or a terrorist) can cause significant damage or disruption despite having fewer resources, less technology, or weaker capabilities compared to their target (like a government or a large organization).
Amplification Attack
An amplification attack is a type of cyberattack where an attacker exploits certain protocols or services to amplify the amount of traffic they send to a target, causing a denial of service (DoS) or distributed denial of service (DDoS) attack.
CLDAP
Connectionless Lightweight Directory Access Protocol (CLDAP) is a protocol used to query and manage directory services (like user databases) without establishing a dedicated connection. Here’s a simple breakdown:
Purpose: Allows quick lookups of information (like user names, emails) from a directory service
NTP
Network Time Protocol (NTP) is a protocol used to synchronize the clocks of computers over a network.
AitM
An Adversary-in-the-Middle (AitM) attack, also known as a Man-in-the-Middle (MitM) attack, is a type of cyberattack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other.