Complete Study Material Flashcards
(324 cards)
Typosquatting
relies on mistakes such as typos made by Internet users when inputting a website address into a web browser
Pretexting
Pretexting is a type of social engineering attack that involves a situation, or pretext, created by an attacker in order to lure a victim into a vulnerable situation
Pharming
Pharming is a more advanced method that manipulates DNS records, redirecting users to fake websites without their knowledge
Watering Hole Attack
a targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site
Influence Campaigns
a large-scale campaign launched by a threat actor, or group of threat actors, with a lot of power (like a hacktivist group, nation-state actor, or terrorist group) that seeks to shift public opinion
Worms
A worm can self-replicate and spread to other computers
Trojan
a type of malware that downloads onto a computer disguised as a legitimate program
Rootkit
A rootkit is malicious software code that provides bad actors with “root” access to an endpoint device kernel or core system files
Virus
A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software
Backdoor
a means of bypassing an organization’s existing security systems
RAT
malware that can control a computer using desktop sharing and other administrative functions
Logic Bomb
A logic bomb is malware that installs and operates silently until a certain
event occurs
Password Spray
Password attack in which the same password is attempted across many accounts
Brute Force
Password attack in which many passwords are attempted against an account to eventually gain access
Rainbow Tables
Pre-built set of hashes. Requires different tables for different hashing methods
Salt
Random data added to a password when hashing. Prevents the success of rainbow tables and significantly slows down brute force attacks
Dictionary Attack
Password attacks where a “dictionary” or list of common words are used to guess an account’s password. Some password crackers can substitute letters for numbers and special characters (3/E, 1/!, A/@)
Hash Collision
Occurs when two entirely unique input values have the same hash
Downgrade Attack
Forces the system to downgrade their security measures, such as rolling back to vulnerable or un-patched versions.
Birthday Attack
An example of a hash collision
Mitigating Privilege Escalation
Patch vulnerabilities quickly, update security software, only allow data execution is certain areas, and randomize address space layout
XSS
Cross-Site Scripting is a vulnerability found on web-based application, which allows an attacker to run scripts in a user input (such as text field) to obtain credentials, session IDs, cookies, etc.
Non-persistent (reflected) vs. Persistent (stored)
SQL Injection
SQL Injection is an attack which allows the attacker to input SQL code into a text field to interact with the data stored in the SQL database. Input validation misconfiguration is typically the cause.
Buffer Overflow
When a section of memory is able to spill over and overwrite another section of memory.