CHP 5 Sec+ Flashcards
Man in the middle
Attack by intercepting legitimate
communication and forging a fictitious response to the sender.
Man in the browser
Attack intercepts communication
between parties to steal or manipulate the data. But whereas a MITM attack occurs between two computers
Reply Attack
Attack is a variation of a MITM attack. Whereas a MITM attack alters and then sends the transmission immediately, a replay attack makes a copy of the legitimate transmission before sending it to the recipient.
Address Resolution Protocol (ARP) Poisoning
A cyber attack where a hacker manipulates the Address Resolution Protocol (ARP) in a network, tricking devices into sending data to the attacker instead of the intended recipient
Domain Name System (DNS) Poisoning
A type of cyber attack that manipulates the Domain Name System (DNS) to redirect internet traffic from legitimate servers to malicious ones.
Privilege escalation
Exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing
Types of Privilege escalation
One type is when a user with a
lower privilege uses privilege escalation to grant herself access to functions reserved for higher-privilege users (sometimes called vertical privilege escalation)
Another type of privilege escalation is when a user with restricted privileges accesses the different restricted functions of a similar user; that is, Mia does not have privileges to access a payroll program but uses privilege escalation to access Li’s account that does have these privileges (horizontal privilege escalation)
Denial of service (DoS)
A deliberate attempt to prevent authorized users from accessing a system. It does this by overwhelming that system with such a very high number of “bogus” requests that the system cannot respond to legitimate
requests.
Distributed denial of service (DDoS)
Instead of only one computer making a bogus request, a DDoS involves hundreds or even tens of thousands of devices flooding the server with requests
Smurf attack
An attacker broadcasts a network request to multiple computers but changes the address from which the request came (called IP spoofing because it imitates another computer’s IP address) to the victim’s computer.
SYN Flood Attack
Takes advantage of the procedures for initiating a session. Under normal network conditions using TCP/IP, a device contacts a network server with a request that uses a control message, called a synchronize message (SYN), to initialize the connection.
SQL Injection
Is a type of cyber attack that targets the security of a database-driven website by manipulating the SQL (Structured Query Language) queries. It occurs when an attacker inserts or “injects” malicious SQL code into input fields or parameters used by a web application that interacts with a database.
Session Hijacking
An attack in which an attacker attempts to impersonate the user by using her session token
URL Hijacking (also called typo squatting)
A type of cyber attack in which someone registers a domain name that closely resembles the URL of a legitimate website. The attacker hopes that unsuspecting users will make an error when typing the URL into their browser and go to the malicious site instead of the actual website.
Buffer overflow attacks
A type of security vulnerability that occurs when a program or process attempts to store more data in a buffer (a temporary storage area) than it was intended to hold. This extra data can overwrite adjacent memory locations, potentially causing the program to behave unexpectedly or allowing an attacker to execute malicious code.