Common Hacking Methodologies Flashcards
Phishing
Most common attack. Click on a link, download malicious code
Ex: “Problem with account”
Bait and Switch
Advertisement that looks legit. Link is not
ClickJacking
being tricked to click something different than what you are being shown
DOS/DDOS
App/bots overflowing TCP 3-way handshake buffers to crowd out legitimate traffic
Fake WAP
Creates man in the middle in two ways
“Starbucks Free” acts as a middleman and sniffs all traffic
It can also redirect to the bait-and-switch page that asks you to confirm credentials.
Keylogger
Software that records every keystroke on a user’s computer
Vishing
Phishing over the phone.
Malware
Virus=Code fragment embedded in another program
Must be executed by a user. Self-replicating. Not remote-controlled.
Malware examples
Installed via “virus dropper” (usually a trojan horse)
File virus = malicious file executing malware
Boot Sector Virus = Loads before the OS does
Macro virus = executed via doc shortcuts like the word
Encrypted virus = hides from anti-virus by decrypting after installation
Worm = Independent program that eats system resources
Executes via system vulnerability, can be remotely controlled
Spreads faster than the virus
Trojan Horse = Uses false name to hide malware and does not replicate
Rootkit = collection of malware that takes over a computer.