Definitions Flashcards
Phishing
social engineering with a touch of spoofing - college access credentials
Prepending
the beginning of a URL has the error ex: theverge.com. vs ttheverge.com
Pharming
redirecting a legit site to a bogus site - poisoned DNS server or client vulnerabilities - Harvest large groups of people. RARE, and hard for anti-malware to stop.
SPIM
SPAM via instant messaging
watering hole
infect a website or site that employees go to that you want to target. That way you can collect their information from the 3rd party’s hacked website. Usually well trained employees who won’t click on phishing emails or open any attachments.
tarpitting
slowing down a server on purpose to make it harder and more annoying for spammers to send messages. It also slows their servers down and they would rather just try screwing with someone else.
viruses
- Malware that can reproduce itself.
- It requires you to execute a program.
- Reproduces through file system or the network.
- May or may not cause problems.
Program virus
- Part of an application
Boot sector virus
- In the boot sector of the virus. When you start OS, the virus is activated.
Script virus
OS and browser-based
Macro virus
Common in MS Office
Fileless virus
Operates in RAM, can avoid antivirus software since it is not written to the storage drive. Can auto-start each time you boot your computer.
Worm
- Type of virus that doesn’t need any user intervention.
- Moves from system to system without user intervention.
- Once ID’d and a signature created, it can be stopped at the firewall or the IPS.
Trojan
- Pretends to be something else and looks like normal software.
- Can disable your security tools.
- Can configure backdoors or download additional malware to install on your system.
PUP
Potentially Unwanted Program - may not be malicious, but could be undesirable and may cause performance problems on your computer. (toolbar, backup utility with tons of ads, etc)
Remote Access Trojan (RAT)
Also called a Remote Administration Tool. - the ultimate backdoor. Can take pretty much full control of your system.
Rootkits
modify core system files, won’t see it in task manager. Invisible to traditional anti-virus utilities.
Spyware
Can have keyloggers
Bots (Botnet)
Usually get on your computer through an OS or application vulnerability. Relay spam, proxy network traffic, distributed computing tasks. Can be for sale creating DDoS as a service in itself!
Logic bomb
Occurs when a separate event is triggered (usually a time bomb), but could be from placing something in a folder, or even just turning off the computer.
Logic bombs follow a particular signature so it’s easy to identify
FALSE
How to prevent logic bombs
- Have formal change control processes and procedures
- Electronic monitoring that scans for specific changes. (tripwire)
hashed passwords
The cryptographic algorithm cannot be reversed. Best way to store passwords. The hash algorithm is different across OSes and applications.
spraying attack
When someone uses the top common passwords to try to break into an account. If they don’t succeed after 3 tries, they just move on to the next potential victim. This avoids any alerts, lockouts, etc.
Dictionary attacks
Discover passwords for common words
Rainbow tables
Contains a massive number of hashes. Pre-calculated hash chains. Much faster especially with longe password lengths. Specific to an app or OS.
Salt
Little bit of extra random data added to the password before it is hashed. If two users happen to be using exactly the same password, the hash that’s stored in the password table is going to be different.
Rainbow tables will not work on _______ passwords
salted
Card cloning
Can only be done with magnetic stripe cards. The chip can’t be cloned!
downgrade attack
if you can sit in the middle and influence that conversation, you could have the two sides downgrade to a type of encryption that might be very easy to break.
Data execution prevention
only data in executable areas can run.
address space layout randomization (ASLR)
involved in preventing exploitation of memory corruption vulnerabilities.[1] In order to prevent an attacker from reliably jumping to, for example, a particular exploited function in memory, ASLR randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap and libraries.
XSS Cross site scripting
Information from 1 site could be shared with another.
Non-persistent (reflected) XSS attack
website allows scripts to run in user input (search boxes). Script embedded in a URL. Usually through a phishing email targeting a single person
Perisistent (stored) XSS attack
Attacker posts a message on a forum with malicious payload. Not a specific target, everyone who visits gets it.
Injection attack types
- SQL injection
- XML injection - XML is a set of rules for data transfer and storage between 2 kinds of devices.
- LDAP injection - LDAP used for storing info about authentication such as usernames, passwords, and other info about devices/users.
- DLL injection - a way to execute some code into an application to have that application execute the code for us.
Buffer overflow
overwriting a buffer of memory - spills over into other memory areas. Can cause a program to exploit in a particular way. Could also crash the program. “EXCESSIVE” example in notes.
Cross-site request forgery
XSRF, CSRF - takes advantage of the trust that a web app has for the user. Requests are made without your consent or your knowledge. The application should have anti-forgery techniques added.
Server side request forgery (SSRF)
SSRF - vulnerable server - web server performs request on behalf of attacker.
Shimming
filling the space between 2 objects (wood shim for a door and a wall). Windows has its own shim for backwards compatibility with previous versions of Windows for apps that need to run on a previous version. Malware authors write their own shims.