Domain 1 Flashcards

Threats, Attacks & Vulnerabilities

1
Q

POC

A

Predictor of Compromise is a signal or warning that an incident may occur in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOC

A

Indicator of Compromise is substantive or corroborating evidence* that an incident may have occurred or may be occurring now.

*Specific artefacts (Virus Signature, IP address, malicious URL, C2, file changes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List Malware characteristics

A
Transparent
Designed to exploit an OS or software vulnerability
OS and device agnostic
Activates programmatically
Responds to commands
Often evades scanning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus

Types + Objective + Characteristics

A

Types:
Boot Sector Virus
File Infector Virus
Macro Virus

Objective: Malicious code whose primary function is to replicate and deliver it’s payload.

Characteristics:
Requires user intervention (clicking on a link).
Requires a host to execute and replicate.
Stealth, Memory Resident, Polymorphic, Metamorphic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm

Types + Objective + Characteristics

A
Types:
Crypto
C&C
APT
Bot

Objective: Malicious code that exploits known vulnerabilities.

Characteristics:
Self replicating
Takes advantage of network transport features to spread (email attachments, instant messages, network connections).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan

Types + Objective + Characteristics

A
Types:
RAT
Backdoor
Downloader
Keylogger

Objective: Malicious code disguised as a legitimate application.

Characteristics:
Spread through user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

Types + Objectives + Characteristics

A
Types:
Firmware
Kernel
Persistent
Application
Library

Objective: Malicious code designed to allow a remote user “root” access.

Characteristics:
Embedded in software or hardware.
Very difficult to remove.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

Types + Objectives + Characteristics

A
Types:
Keylogger
Adware
Tracking cookies
Click fraud

Objective: Code that collects information without consent.

Characteristics:
Can be used to manipulate configuration settings.
Spreads through user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Programmatic

Types + Objectives + Characteristics

A

Types:
Backdoor
Logic Bomb

Objective: Created / inserted by application programmers (coders) or publishers.

Characteristics:
Should be removed prior to production release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware Types:

Stealth

A

Stealth malware is designed to be inconspicuous in order to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware Types:

Memory Resident

A

Memory Resident malware stays resident in memory upon execution can infect other programs running at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware Types:

Armored

A

Armoured malware hides itself by obfuscation or by adding confusing or unnecessary code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware Types:

Polymorphic

A

Polymorphic malware evades pattern-matching detection by frequently changing identifiable characteristics like file name, file type or encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware Types:

Metamorphic

A

Metamorphic malware is rewritten with each iteration so that each succeeding version of the code is different from the preceding one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital infrastructure attacks:

Poisoning

Description + Technique

A

Description:
Manipulating a trusted source of data (DNS cache, ARP cache). Enables an attacker to control the trusted source of data.

Techqniue: DNS/ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital infrastructure attacks:

Hijacking

Description + Technique

A

Description: Intercepting communication between two or more systems. Enables an attacker to eavesdrop, capture, manipulate, and/or reuse data packets.

Techqniue:
MiTM/ MiTB
Replay
Clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Digital infrastructure attacks:

Denial of Service

Description + Technique

A

Description: Overwhelming system resources. Enables an attacker to make services unavailable for their intended use.

Technique:
DoS
DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Digital infrastructure attacks:

Code

Description + Technique

A

Description: Exploiting weaknesses in server or client-side code or applications. Enables an attacker to take control.

Technique:
Injection
XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Wireless Attacks - Close Range

Technique: Bluejacking

Target + Description

A

Target: Bluetooth

Description: Enables an attacker to discover Bluetooth devices and send unsolicited/unwanted messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wireless Attacks - Close Range

Technique: Bluesnarfing

Target + Description

A

Target: Bluetooth

Description: Discovering and connecting to a Bluetooth device with weak or non-existent authentication requirements.

21
Q

Wireless Attacks - Close Range

Technique: NFC Bump

Target + Description

A

Target: NFC

Description: Enables an NFC enabled attacker to connect to an NFC device by being in close enough range

22
Q

Wireless Attacks - Close Range

Technique: RFID Eavesdropping

Target + Description

A

Target: RFID

Description: Intercepting communication between RFID Tags and Readers.

23
Q

Wireless Attacks - 802.11

Technique: Evil Twin

Target: 802.11 + Description

A

Description: Rogue access point that impersonates a legitimate access point.

24
Q

Wireless Attacks - 802.11

Technique: Initialisation Vector

Target: 802.11 + Description

A

Description: Capture of weak initialisation vector (IV) to decrypt data packets.

25
Q

Wireless Attacks - 802.11

Technique: WPS

Target: 802.11 + Description

A

Description: Brute force identification of WiFi Protected Setup (WPS) PIN used to override the access point passphrase and gain access to the network.

26
Q

Wireless Attacks - 802.11

Technique: Jamming

Target: 802.11 + Description

A

Description: Overwhelming wireless frequencies with illegitimate traffic (DoS).

27
Q

Wireless Attacks - 802.11

Technique: Disassociation

Target: 802.11 + Description

A

Description: Spoofing a disassociate message which forces a device to reassociate (often used as a precursor to an Evil Twin attack).

28
Q

Watering hole attack

A

Attacker cannot infiltrate your environment so instead attacks an industry related site. Infects the site and waits for you to access the site so that the attacker can then attack you. Visiting the site could download malicious code.

29
Q

Buffer overflow

A

Spills over into other memory areas.

Developers can perform a bounds check to make sure that nothing can write into memory where they was not expecting it.

30
Q

XML

A

XML is both human readable and machine readable. Extended markup language can be used for data transfer and storage.

31
Q

LDAP Injection

A

Modify LDAP requests to manipulate application results. We can see more information than normally would have access to.

32
Q

XSS Non-Persistant

A

Attacker inputs java script into a search bar or input field where the attacker will execute the script. Anyone from that point onwards who visits the site and inputs data, the attacker will get the information via email.

33
Q

XSS Persistant

A

Attacker stores javascript onto a site, allowing any user who accesses the site to run the javascript (malicious payload).

34
Q

Cross site request forgery – XSRF/CSRF:

A

You trust the web application, browser trusts the webpage. When you authenticate, everything between the browser and website is trusted to be you. The attacker takes advantage of that trust and performs functions for themselves.

35
Q

DNS Spoofing

A

Gain control of domain registration and you have control of where traffic goes.

36
Q

Relay Attack

A

Attacker gains access to raw network data by installing malware on their machine. The malware captures the data locally and sends it to the attacker. Attackers can they replay the data across the network making it look like the original user.

37
Q

Typosquatting

A

changing the domain name by for example one letter sending users to a malicious url. (Misspelling such as a typing error or a different top level domain .org).

38
Q

ClickJacking

A

Attacker sets up a webpage to manipulate users to send money. Webpage has a button to say ‘send £1000 to me’ but the attacker hides the payment button and instead replaces the button with a ‘click here for more puppies’ the user clicks to see more puppies but instead sends money to the attacker.

39
Q

Side Jacking

A

User authenticates with the web server. Web server sends the user a session ID. When the user wants to access the page and automatically log in, the user uses the session ID to do then but when sending the ID to the web server, the attacker intercepts and copies the session ID allowing the attacker to access the site acting as you, having access to everything you have.

To prevent session hijacking, use HTTPS, this encrypts end to end/ VPN.

40
Q

Shimming

A

Filling in the space between two objects. Windows has its own shim which allows older software to be compatible with the latest windows OS. Attackers write their own shims to bypass security controls such as UAC and could escalate their privilege.

41
Q

Refactoring

A

Metamorphic malware changes the way it looks (code) every time its downloaded. Difficult to match with signature based detection

42
Q

Wireless Replay Attacks

A

Easier to capture data. - WEP: Could not stop the capture of 802.11
packets. Attackers could sit around all day and capture IV or replay the ARP request and capture the IV packets that way.

43
Q

RF Jamming

A

DoS attack, prevents wireless connectivity. Goal is to decrease the SNR at the receiving device. Jamming device needs to be close. You also need the right equipment to find the jamming device by using a directional antenna and an attenuator.

44
Q

Constant Jamming

A

with random bits or Constant jamming with legitimate frames. OR data sent at random times.

45
Q

Reactive Jamming

A

when someone tries to communicate with the network device and the network stops working.

46
Q

RFID Tag is what type of communication?

A

BiDirectional communication.

47
Q

What are the benefits of NFC?

A

2 way coms between devices what are close to each other. Payment systems, helps with Bluetooth. Access token helps with payment info over an encrypted channel.

48
Q

RFID & NFC Attacks.

What are the type of attacks?

A

Remote capture, traffic over wireless network. Jamming, causing NFC devices to not operate. Relay/MiTM attack. Lose device, someone can use your token.

49
Q

Wireless Disassociation Attack

A

Connect to an open network. Carry on as normal. Network drops and comes back online every once in awhile. It’s a significant DoS attack.