Domain 1: Threats, Attacks, & Vulnerabilities Flashcards
Shimming
(Driver Manipulation)
Attacker wraps malicious code around legitimate code, such as a driver, to elevate their privilege or install backdoors(
Refactoring
(Driver Manipulation)
Restructures older code to improve it without changing the output behaviors or functionality. Refactoring attack takes advantage of this and adds malicious code unbeknownst to the end user
Active Reconnaissance
Utilizes an intrusive technique like scanning, hands-on testing, and probing of the network to determine vulnerabilities. Interacting with the system
Address Resolution
Converts an IP address to a MAC address
Adversary tactics, techniques, and procedures (TTP)
(Research Resources)
Describes the behaviors and strategies used by a threat actor to develop cyberattacks
Advisories and Bulletins
(Threat Hunting)
Provide summaries of new vulnerabilities
Agile Model (Software Developement)
Process of developing code that is rapid and highly-collaborative.
Software development that is performed in small increments to allow more adaptivity and room to change
Application Programming Interface (API) Attacks
Hostile usage, or attempted hostile usage, of an API from automated threats such as access violations, bot attacks or abuse.
Radio Frequency Identification (RFID)
(Wireless Attack)
Devices that uses a radio frequency signal to transmit identifying info about the device or token holder
Automated Indicator Sharing (AIS)
(Threat Intelligence Sources)
Enables organizations to share & receive machine-readable cyber threat indicators. Speeds up the process of sharing indicators of compromise to support more real-time defense
Bash
(Malicious code or script execution)
Shell/Scripting Language
Birthday Attack
(Cryptographic Attack)
Occurs when an attacker sends 2 different messages through a hash algorithm and it results in the same identical hash digest causing a collision
Brute Force Offline
(Password Attack)
Attacker has access to encrypted material or password hash & tries different keys offline without the risk of discovery
Attempt to discover passwords from a captured database or captured packet scan
Focuses on trying multiple passwords for a single user
Bug bounty
(Penetration Testing)
Deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bug
Cleanup
(Penetration Testing)
Ensures that all installed backdoors or rootkits have been removed, and it should return the system configuration to its original, pre-engagement state
Common Vulnerabilities and Exposures/Common Vulnerability Scoring System (CVE/CVSS)
(Vulnerability Scans)
Provides a reference-method for publicly known information-security vulnerabilities and exposures.
Configuration review
(Vulnerability Scans)
Audits and tests a network system, server or device to ensure it meets current security standards along with any applicable security policies
Credential Harvesting
(Social Engineering Techniques)
Attacks that stockpile databases of usernames, passwords, & sensitive info
Credentialed Scans
(Vulnerability Scans)
Provides more accurate scanning to better identify attacks
Criminal syndicates
Criminal Organization
Cross Site Request Forgery (CSRF)
Attack that forces end user to execute unwanted actions on a web application where they’re currently authenticated
Crypto malware
(Malware)
Type of ransomware that uses encryption to block access to data. Difficult to overcome without paying the ransom or having a backup
Data exfiltration
Occurs when malware or an attacker carries out an unauthorized data transfer from a computer
Disassociation
(Wireless Attack)
Hacker forces a device to lose internet connectivity either temporarily or for extended time
DNS Poisonings
Occurs when the name resolution info is modified in the DNS server’s cache
Domain Hijacking
Domain Hijacking – Attacker tries to take control of domain. Attacker might use the victim’s email account to request a password reset, then using the new password…login to the domain system and change ownership
Domain Reputation
(DNS)
Overall “health” of your branded domain…interpreted by mailbox providers
Driver Manipulation
Attacker dives deep into device drivers and manipulate them so that they can undermine the security on your computer
DLL Injection
(Injection)
Dynamic Link Library -
a technique that allows users to run any code in the memory of another process, by forcing the process to load a foreign DLL file
XML Injection
(Injection)
Extensible Markup Language -
XML is commonly used to transfer data between devices…Attackers perfom XML injection by sending malicious XML to a device
Attack technique used to manipulate the logic of an XML application/service. The injection of unintended XML content and/or structures into an XML message can alter the intend logic of the application
File/Code Repositories
(Threat Intelligence Sources)
Archive of code/files that are being worked on
Footprinting
Means gathering info about a target system that can be used to execute a successful cyber attack
Hybrid warfare (Influence Campaign)
(Social Engineering Techniques)
Mixture of conventional and unconventional methods used against a stronger adversary that aims to achieve political objectives that wouldn’t be possible with traditional warfare
Intelligence Fusion
(Threat Hunting)
Unification of all security and related functions into one operational group to better integrate threat detection, management, and response processes
Intrusive scans
(Vulnerability Scans)
Attempt to exploit a vulnerability when it’s found
Non-intrusive Scans
(Vulnerability Scans)
Identify a vulnerability and report on it.