ISC2 - Study Notes 14 Flashcards
Vendors that release software purchase a certificate from a public certificate authority (CA). This certificate is associated with the software file and the vendor that released it. It includes the name of the vendor and a hash of the file.
Info
A buffer overflow problem starts as a programming error. However, if attackers detect it, they can launch a buffer overflow attack. Successful buffer overflow attacks allow attackers to gain elevated privileges and insert malicious code into normally protected memory areas.
Info
an attacker attempts to insert operating system commands into an application or web page form. If successful, the command executes on the system hosting the application or web page.
Command Injection Attack
??? is a relatively common attack that attempts to inject HTML or JavaScript code into a web page. The attacker modifies the code on the website, and when the user goes to the website, the code executes on the user’s system.
A ??? attack attempts to send a malicious command from the user’s system to the website.
XSS / CSRF
An ??? attack exploits the user’s trust of a website and downloads code onto the user’s system.
A ??? attack exploits the trust that a site has in the user’s browser and attempts to send unauthorized commands from the user’s system to the website.
XSS / CSRF
Some password crackers use rainbow tables to speed up the process of cracking a password. Salting hashed passwords thwarts rainbow table attacks.
PMF helps ensure the integrity of wireless network management traffic. Many devices are already using PMF.
Attackers connect the rouge AP to a wired network and then use it as a sniffer to capture traffic.
Info
??? is the practice of using gathered information to create another scenario and collect additional information. The ???, or the invented scenario, increases the possibility that the person will give up additional information to the social engineer.
Pretexting
??? is also known as masquerading or spoofing. In social engineering, the social engineer is attempting to masquerade as someone else.
Impersonation
is the process of capturing information from credit cards at point-of-sale (POS) readers, gas pumps, and automated teller machines (ATMs). The attacker typically places a thin filament-based plastic, called a skimming film, into a card reader.
Skimming
??? try to hide themselves from antivirus (AV) software by providing false or misleading information about the virus to the AV software.
Stealth Virus