Domain 1.2 - Compare and contrast types of attacks. Flashcards
____________ is the process by which intruders gain access to your facilities, your network, and even your employees by exploiting the generally trusting nature of people.
Social engineering
What is Phishing?
A form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.
How is Spear Phishing different from Phishing?
Phishing that is tailored for a specific individual, a group, or organization is Spear Phishing.
Whaling is Spear Phishing for what types of users?
C-level corporate executives, politicians and celebrities.
Define Vishing
Phishing with Voice.
What is it called when you follow someone through a door they just unlocked?
Tailgating
Impersonation
Pretending to be someone you are not.
If I email you a link to a Fake Anti-Virus, what is that considered?
A Hoax
Everyone else is doing it. I am going to do it to.
Consensus (or Social Proof)
Convincing the person who is being tricked that there is a limited supply of something can often be effective if carefully done. is the principle of
Scarcity
What is the Three-way Handshake?
When you connect to a server your system sends a SYN packet, the server responds with a SYN/ACK, then your computer sends an ACK. This establishes the connection.
What is a SYN flood?
The attacker’s computer sends a SYN packet to a target server. The server responds with a SYN/ACK. The attacker does not send a final ACL, but instead sends more SYN packets.
How does a replay attack work?
After a successful Man-In-the-Middle (MITM) attack occurs. in which the attacker intercepts data between a target and a service the target is reaching. The attacker uses that intercepted data to reconnect to the service as the target user.
How do you prevent a Buffer Overflow?
Prevented with Input Validation
What kind of attack is this:
’ Select * FROM tblUSERS WHERE username = ‘” or ‘1’ =’1’ AND PASSWORD = ‘ ‘ or ‘1’=’1’ ‘
SQL Injection
When an attacler gains access to a restricted directory using HTTP, it is called ________ ________.
Directory Traversal.
An attacker would exploit a vulnerability within a website or web application that the victim would visit, essentially using the vulnerable website as a vehicle to deliver a malicious script to the victim’s browser.
Cross-site scripting (XSS)
What does XSS Stand for?
Cross-Site Scripting.
How do you prevent XSS?
Input Validation
When a website acquires your credentials
XSS
XSRF
Cross-site request forgery
CSRF
Cross-site request forgery
Involves unauthorized commands coming from a trusted user to the website.
XSRF/CSRF
Cross-site request forgery uses this
the current authenticated users credentials.
Best way to prevent XSRF/CSRF
Disable the running of scripts.