CompTIA Security+ Flashcards
Each piece of Malware has 2 steps
Propagation and Payload
What is the propagation method of a Virus?
Spreads by human action. User education can prevent this.
What is the propagation method of a worm?
Spread by themselves. Best way to defend is to update and patch.
What is the propagation method of a Trojan horse?
Disguise themselves as good programs. Act as advertised when run. Deliver a payload behind the scenes. App control provides a good defence.
What is a RAT?
A remote access trojan. It allows attackers to control systems.
What are the kinds of payloads that can be delivered?
Adware, Spyware, Ransomware
What are the characteristics and mechanisms of Adware?
Malware that displays advertisements.
- Changing the default search engine
- Displays pop up advertisements
- Replacing legitimate ads with other ads
What are the characteristics and mechanisms of Spyware?
Gathers information without the user knowing.
- Logging keystrokes
- Monitoring Web Browsing
- Searches hard drives and cloud storage
What are the characteristics and ways to prevent Ransomware?
Blocks access until the ransom is paid
- Anti Malware Software
- Security patches
- User Education
What types of malicious code are there?
Backdoors, Logic bomb, Advanced Malware, Rootkits (User Mode and Kernal mode), Polymorphic viruses, Armoured Viruses, Botnets, Advanced persistent threats.
What are advanced persistent threats?
Well funded, highly skilled groups that are typically government sponsored. They have access to zero days and sophisticated weapons
What is ethical disclosure
Disclosing to the vendor when you have discovered a vulnerability.
How would you differentiate between adversaries?
Internal and External attackers, Level of sophistication, access to resources, motivation, intent
What kind of hackers are there?
Script Kiddies, Hactivists, organised crime, competitors, Nation states
How to you prevent against insider threats?
Implement HR practices: Background checks, principal of least privilege, Separation of duties, Mandatory holidays.
Behavioural indicatiors: Taking work materials home, interest in issues outside of responsibility, duplication of materials, strange network access patterns, using personal hardware.
What is a denial of service attack?
Making a resource unavailable for long periods of time, sends huge numbers of requests to a server, hard to distinguish between legit requests.
What are the limitations of DOS attacks?
Require a substantial amount of bandwidth, easy to block.
What is a DDOS attack?
Distribution denial of service (DDOS) is a DOS attack that leverages a botnet to overwhelm a target.
What is a smurf attack?
Where the attacker sends echo requests to the broadcast address of a 3rd party server using a fake source address. The fake address is actually the real IP of the victim.
What is am amplified DDOS attack?
The attacker choses requests that have very large responses so they can send in lots of very small requests and generate a lot of noise on the other side.
What is the amplification factor?
The degree to which the attack increases in size - Reply/Request=Amplification.
What is an eavesdropping attack?
There is where the attacker relies on a compromised communications path (which is done with Network device tapping, ARP poisoning or DNS poisoning) to listen in.
What is a man in the middle attack?
The attacker tricks the system during the initial communication using DNS or ARP poisoning to force the user to connect directly with the attacker, then the legitimate server. The user however connects with a fake server and the attacker acts as the relay. MITM browser attacks exploit flaws in browsers and plugins.
What is a replay attack?
Uses previously captured data such as encrypted authentication tokens to create a separate connection to the server which is authenticated but doesn’t involve the end user.
How do you prevent eavesdropping attacks?
Use tokens and timestamps
What is a Christmas tree attack?
Where all the flags in a network packets headers are set to 1111111- some systems crash and cant handle the fact that all flags have been set
Domain name service (DNS)
A service that translates common domain name into an IP Address for the purpose of network routing
What is DNS poisoning?
Disrupting normal DNS operations by providing false results. Attacker inserts incorrect DNS records at any point along the hierarchy. They can then redirect traffic to the attackers system. The attackers system includes a web server designed to closely resemble the legit server.
Address resolution protocol (ARP)
A protocol that translates logical IP addresses into the hardware MAC address on LANs
What is ARP poisoning?
Disrupting normal ARP operations by providing false results. Attacker inserts false ARP records so they can redirect traffic back to their server. Only works on LANs
What is TypoSquatting (URL Hijacking)?
An attack that relies on people making simple typing mistakes. Consists of registering similar domain names in hopes that the user will make a typo.
What is a MAC spoofing attack?
It alters hardware addresses. Anyone with Admin access to a system can change its MAC address
What is an IP spoofing attack?
Alters the IP address. Anyone with system admin privileges can alter an IP address.
Ingress filtering
Blocks incoming traffic from external networks bearing an internal source IP address.
Egress filtering
Blocks outbound traffic from internal network bearing a source IP address you don’t control.
/etc/password: Removed passwords
Can remove publicly accessible EXE > Passwords are stored in shadow files. They can be locked down and are highly restricted.
Hash function
- Must produce a completely different output for each input
- Must be computationally difficult to retrieve the input from the output
- Must be computationally difficult to find 2 different inputs that generate the same output.
The Birthday problem
An occurrence where the collisions become rather common with large samples.
Brute force attacks
Attacker guesses all possibilities for the password and keeps battering the system.
Dictionary attacks
Try all English words first
Hybrid password attacks
Adds variations to the tries EG: Year, Day, Season etc
Rainbow table attacks
Precomputes hashes to try and crack the password
Brute force cryptographic attacks
Attacker separately guesses the keys that are being used. Also known as Ciphertext attacks.
Simple shift cipher
With a shift of 1, A’s become B’s, B’s become C’s etc.
What is a keyspace?
The set of all possible encryption keys usable with an algorithm.
EG: 56 bit DES = 72 quadrillion keys
Flawed algorithms may still be susceptible to brute force attacks.
Frequency analysis
Detects patterns in Cypher text - studies the patterns of letters in cypher text.