Common Hacking Methodologies Flashcards

1
Q

Phishing

A

Most common attack. Click on a link, download malicious code
Ex: “Problem with account”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bait and Switch

A

Advertisement that looks legit. Link is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ClickJacking

A

being tricked to click something different than what you are being shown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DOS/DDOS

A

App/bots overflowing TCP 3-way handshake buffers to crowd out legitimate traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fake WAP

A

Creates man in the middle in two ways

“Starbucks Free” acts as a middleman and sniffs all traffic

It can also redirect to the bait-and-switch page that asks you to confirm credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Keylogger

A

Software that records every keystroke on a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vishing

A

Phishing over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

Virus=Code fragment embedded in another program

Must be executed by a user. Self-replicating. Not remote-controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware examples

A

Installed via “virus dropper” (usually a trojan horse)

File virus = malicious file executing malware

Boot Sector Virus = Loads before the OS does

Macro virus = executed via doc shortcuts like the word

Encrypted virus = hides from anti-virus by decrypting after installation

Worm = Independent program that eats system resources
Executes via system vulnerability, can be remotely controlled
Spreads faster than the virus

Trojan Horse = Uses false name to hide malware and does not replicate

Rootkit = collection of malware that takes over a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly