Lesson 12 - Attacking Specialized Systems Flashcards

1
Q

A Technology that is similar to Bluetooth, in that is used to communicate wirelessly over short distances but uses less energy.

A

Bluetooth Low Energy (BLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the major attack that went after IoT devices such as cameras and baby monitors exploiting default passwords to launch DDos Attacks

A

Mirai bot
Dyn - Amazon
Twitter
FitHub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two common network open-source protocols that are used by IoT devices

A

Constrained Application Protocol (CoAP)

Message Queuing Telemetry Transport (MQTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name some common CoAP attacks

A

Coercice parsing attack
Spoofing
Packet Amplification

Used UDP Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe MQTT and name some attacks against it

A

MQTT carries messages between devices and uses authentication however it is typically not encrypted.

Sniffing
Data Modification
Joining a Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T or F a Supervisory control and data Acquistion (SCADA) system is a type of Industrial Control System (ICS)

A

True

Prevalent in the utilities and energy companies controlling their critical infrastructure such as gas lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some common vulnerabilities to an ICS system

A

Leaving Data Exposed - Intelligent Mangement Interface (IPMI) not properly configured

Handling Errors - having error and debug errors that provide too much information to malicious actors

Fuzzing - sends a running app random and unusual characters and monitors how app responds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the term when VM’s are susceptible to configuration vulnerability and not properly authorized and monitored

A

VM Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 Class of Virtual Attacks

A

Class 1 - outside of VM
Class 2 - Directly at VM
Class 3 - Originates within VM and is the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the attack were malware running in a VM is able to interact directly with the Hyper-Visor or host kernel

A

VM Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Virtual attack when a malicious actor takes control of the Hypervisor

A

Hyperjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly