Deck A Flashcards
Deck A
What is Bluesnarfing
A cyber attack involving unauthorised access to information from wireless devices through bluetooth
What is Bluejacking
An attack that sends unsolicited messages to Bluetooth-enabled devices
What is BlueSmacking
A Denial of Service attack that overwhelms a device’s Bluetooth connection
What is Bluebugging
A technique used to gain control over a device via Bluetooth
What is BlueBorne
A set of vulnerabilities that allow attackers to take control of devices, spread malware, or perform other malicious activities via Bluetooth
What is KNB
KNB is an attack that manipulates the data encryption process during Bluetooth connection estbalishment, weakening security
What does KNB stand for
Key Negotiation Bluetooth
What does BIAS stand for
Bluetooth Impersonation AttackS
What does BIAS do
BIAS is an attack that exploits the pairing process allowing an attacker to impersonate a trusted device
What is a Car Whisperer
A Bluetooth hack that targets vehicles, attackers can exploit to remotely unlock car doors or even start the engine without physical access
What is bluetooth designed for
Transferring data over short distances from fixed and mobile devices
What is a network of bluetooth devices called
Piconet
What are multiple piconets called when they can interact
Scatternet
What are risks with bluetooth
Unauthorised access, data theft, interference and device tracking
What is the legacy Bluejacking attack
Sending unsolicited messages to Bluetooth-enabled devices, does not involve stealing data but rather an annoyance. AirDrop suffered from Bluejacking when people had Airdrop settings to Everyone, got fixed with Everyone being disabled after 10 min
What is the legacy Bluebugging attack
An attacker gains full contol over a Bluetooth-enabled device allowing them to access and modify information, attacker does this by tricking the victim into pairing with a trusted device or brute forcing a pairing PIN
What is BlueBorn attack
Threat presenting hackers the ability to exploit Bluetooth connections and gain complete control over targeted devices from computers mobile TV etc. did not require them to be paired or set on discoverable mode
What does KNOB or KNB do
Exploits a flaw in the Bluetooth standard to undermine the encryption of Bluetooth connections that during pairing the attacker can intercept and set the length of the encryption key to one byte which can be bruteforced
What are bluetooth attack mitigations
Keep devices updated, disable bluetooth when not needed, don’t connect to random devices
What is Cryptanalysis
Cryptanalysis is the process of decrypting coded or encrypted data without access to the key used in the encryption process
What is Cypher text
Cypher text is the scrambled, unreadable form of the plain text resulting from an encryption algorthm, this transformation is controlled by a key which is used in the encryption/decryption process.
What is a Symmetric encryption
Same key is used for encryption/decryption
What is Asymmetric encryption
Public key is used for encryption and private key is used for decryption
What is frequency analysis
Based on the statistical study of the letters and symbols in the cypher text, if the freq. of characters in the cypher text matches the freq. of letters in the plain text it can provide clues to the substitution used
What is a Cryptanalysis Side Channel Attack
A Cryptanalysis Side Channel Attack refers to a category of crypographic attacks that exploit information inadvertantly leaked during the execution of cryptographic algorithms
What are the three types of cryptanalysis sidechannel attacks
Timing attacks, Power-monitoring attacks and Acoustic attacks
What is a timing attack in cryptanalysis
Where an attacker gains information based on the amount of time the system takes to process different inputs. The attack measures the computation time to make informed guesses about the secret key
What is a mitigation of a timing attack
Using constant-time algorithms to remove the correlation between data-dependant computation times and secret information
What is a power monitoring attack in cryptanalysis
An attacker can exploit the variations in a devices power consumption to extract information based on the observation of the power consumption of a device during the execution of cryptographic operations.
What are the two different types of Power monitoring attacks
Simple Power Analysis (SPA) and Differential Power Analysis (DPA)
What is a SPA
Simple Power Analysis
What is a DPA
Differential Power Analysis
What does a SPA do
The attacker interprets the power consumption graph to identify operations, a spike in power could mean a specific operation
What does a DPA do
A more sophisticated attack collecting power consumption data for many operations and using statistical analysis to find correlation between power consumption and values in bits in the secret key
Mitigation of Power monitoring attacks
Power regulation and randomisation techniques to make power analysis more difficult
What is Acoustic Cryptanalysis attack
Where an adversary seeks to extract information by analysing the sound emissions it produces during operation, sound emissions often correlate with different internal states or operations. The sound produced by the computers CPU or fans can change based on the computation being performed
Mitigation of acoustic cryptanalysis attack
Use sound-absorbing materials in device construction and phyisically isolating sensitive components to reduce sound emissions
What is the Spectre vulnerabiltiy
Spectre is a microprocessor vulnerability which breaks the isolation between applications allowing an attacker to trick error-free programs into leaking secrets.
What is the Meltdown vulnerability
Meltdown is a microprocessor vulnerabiltiy that dissolves the isolation between user applications and the operating system allowing a malicious program to access the memory of other programs and the operating system
What is the different between BFLA and BOLA
In BOLA the user is allowed to use the endpoint, in BFLA they are not authorised to use that endpoint
What is BOLA stand for
Broken Object Level Authorisation
What does BFLA stand for
Broken Function Level Authorisation
What is SSRF
SSRF occurs when a web server fetches a remote resource and does not verify if that is an allowed link to the resource
How can we determine SSRF
Using a netcat connection to ourself or to the localhost:80
How to prevent SSRF
Remote resources checked against whitelist, not accepting user-input
What is HTTPS also known as
HTTP over TLS
What does TLS stand for
Transport Layer Security
What does SSL stand for
Secure Sockets Layer
What are the 3 levels encryption can be applied at
Encryption at rest - Encryption-in-transit, End-to-end encryption
What is encryption at rest
Stored in an encrypted format to prevent unauthorised access