Domain 1: Threats, Attacks, & Vulnerabilities Flashcards

1
Q

Shimming
(Driver Manipulation)

A

Attacker wraps malicious code around legitimate code, such as a driver, to elevate their privilege or install backdoors(

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refactoring
(Driver Manipulation)

A

Restructures older code to improve it without changing the output behaviors or functionality. Refactoring attack takes advantage of this and adds malicious code unbeknownst to the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Reconnaissance

A

Utilizes an intrusive technique like scanning, hands-on testing, and probing of the network to determine vulnerabilities. Interacting with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution

A

Converts an IP address to a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adversary tactics, techniques, and procedures (TTP)
(Research Resources)

A

Describes the behaviors and strategies used by a threat actor to develop cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advisories and Bulletins
(Threat Hunting)

A

Provide summaries of new vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agile Model (Software Developement)

A

Process of developing code that is rapid and highly-collaborative.

Software development that is performed in small increments to allow more adaptivity and room to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Programming Interface (API) Attacks

A

Hostile usage, or attempted hostile usage, of an API from automated threats such as access violations, bot attacks or abuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Radio Frequency Identification (RFID)
(Wireless Attack)

A

Devices that uses a radio frequency signal to transmit identifying info about the device or token holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Automated Indicator Sharing (AIS)
(Threat Intelligence Sources)

A

Enables organizations to share & receive machine-readable cyber threat indicators. Speeds up the process of sharing indicators of compromise to support more real-time defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bash
(Malicious code or script execution)

A

Shell/Scripting Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Birthday Attack
(Cryptographic Attack)

A

Occurs when an attacker sends 2 different messages through a hash algorithm and it results in the same identical hash digest causing a collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute Force Offline
(Password Attack)

A

Attacker has access to encrypted material or password hash & tries different keys offline without the risk of discovery

Attempt to discover passwords from a captured database or captured packet scan

Focuses on trying multiple passwords for a single user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bug bounty
(Penetration Testing)

A

Deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cleanup
(Penetration Testing)

A

Ensures that all installed backdoors or rootkits have been removed, and it should return the system configuration to its original, pre-engagement state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Vulnerabilities and Exposures/Common Vulnerability Scoring System (CVE/CVSS)
(Vulnerability Scans)

A

Provides a reference-method for publicly known information-security vulnerabilities and exposures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Configuration review
(Vulnerability Scans)

A

Audits and tests a network system, server or device to ensure it meets current security standards along with any applicable security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Credential Harvesting
(Social Engineering Techniques)

A

Attacks that stockpile databases of usernames, passwords, & sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Credentialed Scans
(Vulnerability Scans)

A

Provides more accurate scanning to better identify attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Criminal syndicates

A

Criminal Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cross Site Request Forgery (CSRF)

A

Attack that forces end user to execute unwanted actions on a web application where they’re currently authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Crypto malware

(Malware)

A

Type of ransomware that uses encryption to block access to data. Difficult to overcome without paying the ransom or having a backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data exfiltration

A

Occurs when malware or an attacker carries out an unauthorized data transfer from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disassociation
(Wireless Attack)

A

Hacker forces a device to lose internet connectivity either temporarily or for extended time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DNS Poisonings

A

Occurs when the name resolution info is modified in the DNS server’s cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Domain Hijacking

A

Domain Hijacking – Attacker tries to take control of domain. Attacker might use the victim’s email account to request a password reset, then using the new password…login to the domain system and change ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Domain Reputation
(DNS)

A

Overall “health” of your branded domain…interpreted by mailbox providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Driver Manipulation

A

Attacker dives deep into device drivers and manipulate them so that they can undermine the security on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DLL Injection
(Injection)

A

Dynamic Link Library -
a technique that allows users to run any code in the memory of another process, by forcing the process to load a foreign DLL file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

XML Injection
(Injection)

A

Extensible Markup Language -
XML is commonly used to transfer data between devices…Attackers perfom XML injection by sending malicious XML to a device

Attack technique used to manipulate the logic of an XML application/service. The injection of unintended XML content and/or structures into an XML message can alter the intend logic of the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

File/Code Repositories
(Threat Intelligence Sources)

A

Archive of code/files that are being worked on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Footprinting

A

Means gathering info about a target system that can be used to execute a successful cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Hybrid warfare (Influence Campaign)
(Social Engineering Techniques)

A

Mixture of conventional and unconventional methods used against a stronger adversary that aims to achieve political objectives that wouldn’t be possible with traditional warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Intelligence Fusion
(Threat Hunting)

A

Unification of all security and related functions into one operational group to better integrate threat detection, management, and response processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Intrusive scans
(Vulnerability Scans)

A

Attempt to exploit a vulnerability when it’s found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Non-intrusive Scans
(Vulnerability Scans)

A

Identify a vulnerability and report on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Jamming
(Wireless Attack)

A

Attacker floods target with radio signals to disrupt legit traffic. Causes DOS condition

38
Q

What are Layer 2 Attacks?

A

Data link layer Attacks

39
Q

Legacy Platforms

A

An operating system no longer in widespread use

40
Q

Lightweight Directory Access Protocol (LDAP) - (Injection)

A

Attack that modifies queries and commands to the LDAP server to manipulate its behavior

41
Q

Log aggregation
(SIEM)

A

Process of collecting, standardizing, and consolidating log data from across an IT environment to facilitate streamlined log analysis

42
Q

Log collectors
(SIEM)

A

Process of collecting log entries from many different sources in an organization and bringing them all to a single place

Collects log data from devices throughout the network and stores these logs in a searchable database

43
Q

MAC Flooding

A

Attempt to overwhelm the limited memory set aside to store the MAC addresses for each port

44
Q

Macros
(Malicious code or script execution)

A

Instruction that carries out program commands automatically within an application. Typically used in popular office applications…Microsoft Word and Excel. Macro viruses attack applications

45
Q

Maneuvers
(Threat Hunting)

A

Process of gathering information resources to obtain a strategic, operational, or tactical competitive advantage

46
Q

Memory Leak

A

Form of memory consumption where the developer fails to free an allocated block of memory when no longer needed

47
Q

Network Scan
(Vulnerability Scans)

A

Identifying weaknesses on a computer, network

48
Q

Non-credentialed Scans/Uncredentialed
(Vulnerability Scans)

A

Provide a quick view of vulnerabilities by only looking at network services exposed by the host

Generally unable to detect many vulnerabilities on a device.

49
Q

Brute Force Online
(Password Attack)

A

Attacker tries to gain access to a single account by guessing several different passwords while the system is online.

*ncrack can automate this process

50
Q

OSINT (Open source intelligence)

A

The act of gathering and analyzing publicly available data for intelligence purposes.

Gathering info that is public, via websites and social media

51
Q

Outsourced code development
(3rd Party Risks)

A

Takes place when companies choose to have custom software solutions developed by a third party

52
Q

Packet capture
(SIEM)

A

The action of capturing Internet Protocol (IP) packets for review or analysis. Common troubleshooting technique for network administrators and is also used to examine network traffic for security threats.

Protocol analyzers (sometimes called sniffers) capture network traffic allowing administrators to view and analyze individual packets.

53
Q

Pass the Hash

A

Attacker captures a password hash and then passes it through for authentication and potentially lateral access to other networked systems. Attacker doesn’t need to decrypt the hash to obtain plain text password

Process of harvesting an account’s cached credentials when the user logs in to a single sign-on (SSO) system. This would then allow the attacker to use the credentials on other systems

54
Q

Passive Reconnaissance

A

Utilize open source info, the passive collection and analysis of the network data and other unobtrusive methods without making direct contact with targeted systems. Uses social media, public info

55
Q

Persistence
(Penetration Testing)

A

When a threat actor discreetly maintains long-term access to systems despite disruptions such as restarts or changed credentials

56
Q

Pharming
(Social Engineering Techniques)

A

Occurs when attacker redirects one website’s traffic to another website that is malicious

57
Q

Pivoting
(Penetration Testing)

A

Process of using an exploited system to target other systems

Process of using various tools to gain additional information. Ex: A tester gains access to Homer’s computer within a company’s network. The tester can then pivot and use Homer’s computer to gather information on other computers

58
Q

Pointer/object dereference

A

Used to access or manipulate data contained in memory location pointed to by a pointer.

*A pointer is a variable that stores the address of another variable

59
Q

Predictive Analysis
(Threat Intelligence Sources)

A

The use of data, statistical algorithms and machine learning techniques to identify the likelihood of future outcomes based on historical data.

60
Q

Prepending
(Social Engineering Techniques)

A

When an attacker attaches a trustworthy value to the beginning of a message to make it look legit. Tricks user into doing something they usually would not

When attacker adds code to the beginning of a presumably safe file

61
Q

Pretexting
(Social Engineering Techniques)

A

Attacker tries to convince victim to give up valuable info by coming up with a story to fool the victim

62
Q

ARP Poisonings

A

Attacker sends falsified ARP messages over a local area network (LAN) to link an attacker’s MAC address with the IP address of a legitimate computer or server on the network. Allows the attacker to intercept or alter messages to the real MAC address

Carried out over a Local Area Network (LAN) that sends malicious ARP packets to a default gateway on a LAN

63
Q

Python
(Malicious code or script execution)

A

Scripting/Coding Language

Normally have a .PY or .PYW file extension.

64
Q

Rainbow Table
(Password Attack)

A

List of precomputed values used to quickly break a password since values don’t have to be calculated for each password being guessed. Can’t be edited during actual attack

Precalculated hashes of passwords with a given character base (e.g., a–z, A–Z, 0–9, and 7 characters long) that can be quickly looked up to determine a password. Time consuming to make

65
Q

Reconnaissance
(Social Engineering Techniques)

A

Practice of covertly discovering and collecting info about a system

66
Q

Replay Attack

A

Attacker eavesdrops on a secure network communication, intercepts it, and then delays or resends it to misdirect the receiver into doing what the attacker wants

Network attack where valid data transmission is captured and is then maliciously repeated or delayed

67
Q

Rogue Access Point
(Wireless Attack)

A

Wireless access point that’s been installed on a secure network without authorization from a local network administration

68
Q

Secure Sockets Layer Stripping (SSL Stripping/Downgrading)

A

Takes advantage of users not requesting secure pages explicitly and relying on the web servers to redirect them to the secure version. Strips a connection from an HTTPS connection to a lesser HTTP connection

69
Q

Security of machine learning algorithm
(AI Attack)

A

Can help businesses analyze threats & respond to attacks & security incidents. Build models of behaviors & use those models as a basis for making future predictions based on new data.

Ex: Netflix suggesting new movies based on your viewing history.

70
Q

Security orchestration, automation, and response (SOAR)

A

Technology helps coordinate, execute and automate tasks between various people and tools all within a single platform give organizations a single source for observing, understanding, deciding upon and acting on security incidents

Pulls info from external emerging threat intelligence feeds, endpoint security software and other 3rd party resources to get a better picture of the security landscape inside the network and out.

Uses runbooks to automate incident response thus reducing incident response time

71
Q

Sentiment analysis
(SIEM)

A

Technique used to determine whether data is positive, negative or neutral

72
Q

Server Side Request Forgery (SSRF)

A

Attack against server. Attacker causes server to make a connection to internal-only services within the organization’s infrastructure. Or attacker may be able to force the server to connect to arbitrary external systems, potentially leaking sensitive data

73
Q

Session Replay

A

Attacker steals a valid session ID of a user, then reuses it to impersonate them and perform fraudulent activities

74
Q

Shadow IT

A

Any IT used by a department without the central IT department knowing or approving it

75
Q

SIEM

A

Security Information and Event Management-provides a centralized solution for collecting, analyzing, and managing data from multiple sources

Tools used to centrally collect log data related to IT activity that can then be analyzed for potential security incidents

76
Q

Skimming
(Physical Attack)

A

Technique used by attackers to capture credit card info from a cardholder secretively

77
Q

State Actors

A

Person who’s acting on behalf of a governmental body

78
Q

Structured query language Injection (SQL Injection)
(Injection)

A

Attack where the injection of an SQL query via input data from the client to a web application.

Occurs when you ask a user for input, like their username, and instead of a username, the user gives you an SQL statement that you will unknowingly run on your database. 1=1

79
Q

Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of Intelligence Information (TAXII)
(Threat Intelligence Sources)

A

Structured language for describing cyber threat info so it can be shared, stored, analyzed, and used in a consistent manner that facilitates automation

80
Q

Supply Chain

A

Companies/people that are involved in the production & delivery of a product or service to consumer

81
Q

Supply Chain Attacks (value-chain or 3rd-party attack)

A

Occurs when someone infiltrates your system through an outside partner or provider with access to your systems & data

82
Q

Supply chain risk
(3rd Party Risks)

A

Occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data

83
Q

Syslog/Security information and event management (SIEM)

A

Security software solution that helps organizations recognize potential security threats and vulnerabilities before they can disrupt business operations.

Uses several security resources to aggregate log data, security alerts, and events into a centralized platform to provide real-time analysis for security monitoring.

A centralized solution for collecting, analyzing, and managing data from multiple sources Provides real-time monitoring, analysis, and notification of security events, such as suspected security incidents

84
Q

Tainted training data for machine learning (ML)
(AI Attack)

A

Training data is the data you use to train a machine learning algorithm or model…attackers can taint this data by injecting dirty data causing machine to misbehave

85
Q

Threat Maps
(Threat Intelligence Sources)

A

Real-time map of the computer security attacks that are going on at any given time

86
Q

Visual Basic for Applications (VBA)
(Malicious code or script execution)

A

Shell/Scripting Language

87
Q

Vulnerability databases
(Threat Intelligence Sources)

A

Collection of searchable information on vulnerabilities that affect information systems. Tool that lets to access information on known vulnerabilities

88
Q

War driving

A

Driving around with a looking for open unsecured wireless networks

89
Q

War flying

A

Person uses an UAV (drone) instead of a vehicle to detect unsecured wireless networks

90
Q

Waterfall Model (Software Developement)

A

Sequential model that divides software development into pre-defined phases.
Not very flexible and difficult to implement revisions

91
Q

Port-based VLAN

A

You can assign specific routers and switch ports to different VLANs, which allows you to assign any network segment on any floor of your office to a specific VLAN. This provides flexibility so that the user’s location does not limit their network access

92
Q

Subnetting

A

Breaking down an IP address into smaller units that can be assigned to individual network units within the original network

The process of dividing IP addresses into smaller subunits that can later be assigned to multiple network devices in a network

Divides an IP address into two parts, namely network address and host address