Indicators of Attacks Flashcards

1
Q

Virus

A

Viruses are malicious programs that must be triggered by the activation of their host; objective is to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

Worms are stand-alone malicious programs that can self-replicate and propagate independently as soon as they have breached the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomeware

A

Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Ransomware requires that someone pay the ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crypto-malware

A

Crypto-malware can operate indefinitely on a system, benefiting the criminal without the victim having to do anything, and may never be noticed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan

A

A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAT

A

A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is very dangerous because it enables intruders to get remote control of the compromised computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bot

A

A botnet is a collection of internet-connected devices (IoT devices) infected by malware that allow hackers to control them. Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft and DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command and Control

A

A command-and-control [C&C] server is a computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network. It can be used to disseminate commands that can steal data, spread malware, disrupt web services, and more. Runs the botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fileless Virus

A

Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove. Stays in RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bomb

A

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkit

A

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. Root privilege’s on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Backdoor

A

A backdoor is a malware type that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adversarial Artificial Intelligence

A

Adversarial AI is a technique employed in the field of artificial intelligence which attempts to fool models through malicious input. This technique can be applied for a variety of reasons, the most common being to attack or cause a malfunction in standard AI models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adversarial Artificial Intelligence: Evasion

A

Evasion attacks are the most prevalent type of attack.. Samples are modified to evade detection; that is, to be classified as legitimate. This does not involve influence over the training data. A clear example of evasion is image-based spam in which the spam content is embedded within an attached image to evade textual analysis by anti-spam filters. Another example of evasion is given by spoofing attacks against biometric verification systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Adversarial Artificial Intelligence: Poisoning

A

Poisoning is adversarial contamination of training data. Machine learning systems can be re-trained using data collected during operations. For instance, intrusion detection systems (IDSs) are often re-trained using such data. An attacker may poison this data by injecting malicious samples during operation that subsequently disrupt retraining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Adversarial Artificial Intelligence: Model Stealing

A

Model stealing (also called model extraction) involves an adversary probing a black box machine learning system in order to either reconstruct the model or extract the data it was trained on. This can cause issues when either the training data or the model itself is sensitive and confidential. For example, model stealing could be used to extract a proprietary stock trading model which the adversary could then use for their own financial benefit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Malicious USB Cables

A

A malicious cable is any cable (electrical or optical) which performs an unexpected, and unwanted function. The most common malicious capabilities are found in USB cables. Data exfiltration, GPS tracking, and audio eavesdropping are the primary malicious functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malicious USB Drives

A

Malicious USB sticks are leveraged where an attacker needs physical access to a computer. In the most basic of USB drop attacks, the user clicks on one of the files on the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Card Cloning / Skimming

A

Cloning, also known as skimming, refers to the copying of credit or debit card information using software or an electronic device, in order to gain unauthorized access to your account.

22
Q

Supply Chain Attacks

A

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry or government sector.

23
Q

Keyloggers

A

A keylogger is an insidious form of spyware. Keyloggers are activity-monitoring software programs that give hackers access to your personal data.

24
Q

Hashcat

A

Allows you to crack passwords via gpu.

25
Q

Rainbow Table Attack

A

A rainbow table is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function up to a certain length consisting of a limited set of characters.

26
Q

Privilege Escalation

A

Privilege escalation is a type of network attack used to obtain unauthorized access to systems within the security perimeter, or sensitive systems, of an organization.

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.

27
Q

SSL Stripping

A

SSL Stripping or an SSL Downgrade Attack is an attack used to circumvent the security enforced by SSL certificates on HTTPS-enabled websites. In other words, SSL stripping is a technique that downgrades your connection from secure HTTPS to insecure HTTP and exposes you to eavesdropping and data manipulation.

28
Q

Pass the Hash

A

PtH attacks exploit the authentication protocol, as the passwords hash remains static for every session until the password is rotated. When a user logs onto a Windows workstation or server, they essentially leave behind their password credentials.

A pass the hash attack is an exploit in which an attacker steals a hashed user credential and, without cracking it, reuses it to trick an authentication system into creating a new authenticated session on the same network.

29
Q

Vertical Privilege Escalation

A

Vertical privilege escalation, also known as privilege elevation, where a lower privilege user or application accesses functions or content reserved for higher privilege users or applications (e.g. Internet Banking users can access site administrative functions or the password for a smartphone can be bypassed).

30
Q

Horizontal Privilege Escalation

A

Horizontal privilege escalation, where a normal user accesses functions or content reserved for other normal users (e.g. Internet Banking User A accesses the Internet bank account of User B).

31
Q

HSTS

A

https strict transport security

32
Q

Cross-site Scripting XSS

A

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

Cross-site scripting is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

33
Q

Injections

A

Injection attacks refer to a broad class of attack vectors. In an injection attack, an attacker supplies untrusted input to a program. This input gets processed by an interpreter as part of a command or query. The primary reason for injection vulnerabilities is usually insufficient user input validation.

34
Q

DLL Injection Attack

A

DLL injection is used to manipulate the execution of a running process. Most DLL injection attacks are performed to do reverse engineering attacks. As the name suggests, “DLL injection” primarily tricks an application to call a malicious DLL file which then gets executed as part of the target process.

35
Q

LDAP Injection Attack

lightweight directory access protocol

A

LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it’s possible to modify LDAP statements using a local proxy.

36
Q

XML Injection Attack

A

XML Injection is an attack technique used to manipulate or compromise the logic of an XML application or service. The injection of unintended XML content and/or structures into an XML message can alter the intend logic of the application.

37
Q

Input Validation

A

Input validation, also known as data validation, is the proper testing of any input supplied by a user or application. Input validation prevents improperly formed data from entering an information system.

38
Q

Pointer Dereference

A

The program can potentially dereference a null pointer, thereby raising a NullPointerException. Null pointer errors are usually the result of one or more programmer assumptions being violated. A null-pointer dereference takes place when a pointer with a value of NULL is used as though it pointed to a valid memory area. Uses an asterix.

39
Q

Directory Transversal

A

A directory traversal attack exploits insufficient security validation or sanitization of user-supplied file names, such that characters representing “traverse to parent directory” are passed through to the operating system’s file system API.

40
Q

Buffer Overflows

A

Attackers exploit buffer overflow issues by overwriting the memory of an application. This changes the execution path of the program, triggering a response that damages files or exposes private information.

41
Q

Race Conditions: TOCTOU

Time of Check, Time of Use

A

In software development, time-of-check to time-of-use (TOCTOU, TOCTTOU or TOC/TOU) is a class of software bugs caused by a race condition involving the checking of the state of a part of a system (such as a security credential) and the use of the results of that check.

42
Q

Error Handling

A

Improper error handling results when security mechanisms fail to deny access until it’s specifically granted. This may occur as a result of a mismatch in policy and coding practice. It may also result from code that lacks appropriate error handling logic.

43
Q

Improper Input Handling

A

Improper Input Handling is the term used to describe functions such as validation, sanitization, filtering, or encoding and/or decoding of input data. Improper Input Handling is a leading cause of critical vulnerabilities that exist in today’s systems and applications.

44
Q

Replay Attacks

A

A replay attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP packet substitution. MITM attack. Stealing session information and reusing it. Can you session tokens to defeat this.

45
Q

Request Forgeries
Cross-site request forgery - CSRF
Session Riding

A

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.

46
Q

API Attacks:

API is the acronym for Application Programming Interface, which is a software intermediary that allows two applications to talk to each other.

A

An API attack is hostile usage, or attempted hostile usage, of an API. APIs essentially act as a software intermediary that allows systems and applications to communicate with each other in simple, programmatic ways.

The most prevalent are login attacks. Similar to providing login credentials to access a secure website, APIs also have an authentication process. API management systems may reject invalid login attempts, but they usually don’t have adequate mechanisms to stop clients from continuously trying new combinations in an automated fashion, also known as credential stuffing. To remain undetected in these attempts, hackers keep request rates below rate limits and periodically change IP addresses to make detection difficult.

47
Q

Server Side Request Forgery: SSRF

A

Server Side Request Forgery (SSRF) is a type of attack that can be carried out to compromise a server. The exploitation of a SSRF vulnerability enables attackers to send requests made by the web application, often targeting internal systems behind a firewall.

Counter by input validation.

48
Q

Driver Manipulation:

Shimming, Refactoring

A

Device drivers allow an operating system such as Windows to talk to hardware devices such as printers. Sophisticated attackers may dive deep into the device drivers and manipulate them so that they undermine security on your computer.

49
Q

Integer Overflow

A

An integer overflow occurs when you attempt to store inside an integer variable a value that is larger than the maximum value the variable can hold. In practice, this usually translates to a wrap of the value if an unsigned integer was used and a change of the sign and value if a signed integer was used.

50
Q

Resource Exhaustion

A

Resource exhaustion attacks are computer security exploits that crash, hang, or otherwise interfere with the targeted program or system.

51
Q

Memory Leak

A

Most memory leaks result in general software reliability problems, but if an attacker can intentionally trigger a memory leak, the attacker might be able to launch a denial of service attack (by crashing or hanging the program) or take advantage of other unexpected program behavior resulting from a low memory condition.