Lesson 4 & 5 Flashcards

1
Q

Pretexting

A

(form of impersonation) Using a scenario with convincing
additional detail The classic impersonation attack is for the social engineer to phone into a department,
claim they have to adjust something on the user’s system remotely, and get the user to
reveal their password. This specific attack is also referred to as pretexting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tailgating

A
  • Access premises covertly

* Follow someone else through a door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

• Piggy backing

A
  • Access premises without authorization, but with the knowledge of an employee
  • Get someone to hold a door open
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• Identity fraud

A
  • Impersonation with convincing detail and stolen or spoofed proofs
  • Identity fraud versus identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

• Invoice scams

A

• Spoofing supplier details to submit invoices with false account details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• Credential theft and misuse

A

Credential harvesting
• Shoulder surfing
• Lunchtime attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PHishing, whaling, vishing, spear fishing, sMishing

A

you know this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spam

A
  • Unsolicited email
  • Email address harvesting
  • Spam over Internet messaging (SPIM) (instant messagin service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hoaxes

A
  • Delivered as spam or malvertising
  • Fake advertisement to get user to install remote desktop software
  • Phone-based scams

Hoaxes, such as security alerts or chain emails, are another common social
engineering technique, often combined with phishing attacks. An email alert or web
pop-up will claim to have identified some sort of security problem, such as virus
infection, and offer a tool to fix the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prepending

A

adding text that appears to have been generated by the mail
system.

  • Tagging email subject line
  • Can be used by threat actor as a consensus or urgency technique
  • Can be added by mail systems to warn users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A

(passive technique)

• Redirection by DNS spoofing

Pharming is a passive means of redirecting users from a legitimate website to a
malicious one. Rather than using social engineering techniques to trick the user,
pharming relies on corrupting the way the victim’s computer performs Internet name
resolution, so that they are redirected from the genuine site to the malicious one. For
example, if mybank.foo should point to the IP address 2.2.2.2, a pharming attack would
corrupt the name resolution process to make it point to IP address 6.6.6.6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typosquatting

A

Www.comptia.org ==> www.connptia.org

Use cousin domains instead of redirection
• Make phishing messages more convincing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• Watering hole

A
  • Target a third-party site

* Customer, supplier, hobbies, social media…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Credential harvesting

A

• Attacks focused on obtaining credentials for sale rather than direct
intrusion
• Attacks focused on obtaining multiple credentials for single
company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Influence Campaigns

A
Sophisticated threat actors using multiple resources to change opinions on 
a mass scale
- Soft power
- Hybrid Warfare
-social Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Soft power

A

• Leveraging diplomatic and cultural assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

• Hybrid warfare

A

• Use of espionage, disinformation, and hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

• Social media (influence campaign)

A
  • Use of hacked accounts and bot accounts

* Spread rumor and reinforce messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

• Viruses and worms

A

• Spread within code without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Trojans

A

• A malicious program concealed within a benign one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

• Potentially unwanted programs/applications (PUPs/PAPs)

A

•Nonecessarily regarded as malicious
Pre-installed “bloatware” or installed alongside another app
• Not completely concealed, but installation may be covert
• Also called grayware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computer Viruses

A
• Rely on some sort of host file or 
media
• Non-resident/file infector
• Memory resident
• Boot
• Script/macro 
• Multipartite
• Polymorphic
• Vector for delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Multipartite

A

virus uses multiple vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Polymorphic

A

(virus) able to obfuscate code to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

• Early computer worms

A
  • Propagate in memory/over network links

* Consume bandwidth and crash process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

• Fileless malware

A

does not write code to disk. avoids detection

“Living off the land”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Advanced persistent threat (APT)/advanced volatile threat (AVT)/
low observable characteristics (LOC)

A

All used to describe fileless live off the land malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

• Backdoor malware

A

Any type of access method to a host that circumvents the usual authentication method
and gives the remote user administrative control can be referred to as a backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RAT

A

Remote Access Trojan

backdoor malware that mimics the functionality of
legitimate remote control programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

bots and botnet

A

A group of bots that are all under
the control of the same malware instance can be manipulated as a botnet by the
herder program. A botnet can be used for many types of malicious purpose, including
triggering distributed denial of service (DDoS) attacks, launching spam campaigns, or
performing cryptomining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

• Command & control (C2 or C&C)

A

Whether a backdoor is used as a standalone intrusion mechanism or to manage
bots, the threat actor must establish a connection from the compromised host to a
command and control (C2 or C&C) host or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Ransomware

A

Nuisance (lock out user by
replacing shell)

usually easier to fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

• Crypto-malware

A

High impact ransomware (encrypt

data files or drives)

34
Q

• Cryptomining/crypojacking

A

• Hijack resources to mine

cryptocurrency

35
Q

• Logic bombs

A

wait for a pre-configured time or date (time bomb) or a system or user event

36
Q

Malware Indicators

A

Browser changes or overt ransomware notification
• Anti-virus notifications
• Endpoint protection platforms and next-gen A-V
• Behavior-based analysis

  • Sandbox execution
  • Cuckoo
• Resource utilization/consumption
•    Task Manager and top
• 
File system changes
• Registry
• Temp file
37
Q

cukoo

A

does sandbox execution. puts the malware in a completely isolated location from the host

38
Q

shellcode

A

Fileless malware uses lightweight shellcode to achieve a backdoor mechanism
on the host. The shellcode is easy to recompile in an obfuscated form to evade
detection by scanners.

39
Q

Process analysis

A

Signature-based detection is failing
to identify modern APT-style tools

Looking for abnormal behavior

40
Q

Process Explorer

A

Does process analysis

41
Q

output from hashing

A

checksum, hash or digest

42
Q

Anti collision

A

(hashing) - no two plaintexts likely to produce the same checksum

43
Q

SHA

A

Secure Hash Algorithm (SHA) - considered the strongest algorithm

44
Q

Message Disgest Algorithm (MD5)

A

for hashing. not as strong as SHA but sometimes required for compatibilities

45
Q

Hashing

A

not encryption. process is not reversible

46
Q

Substitution vs Transposition

A

Substitution - changing the letters or symbols

Transposition - reordering

47
Q

key protection

A

protecting the key is easier than protecting the algorithm

48
Q

symetric encryption

A

Same key used for encryption and decryption on both sides

Good fo bulk

Problemtn distributing key securley

49
Q

• Stream ciphers

A
  • Encrypt and decrypt each bit/byte at a time

* Must be used with an initialization vector (IV)

50
Q

• Block ciphers

A
  • Treat data as equal-size blocks, using padding if necessary
  • Advanced Encryption Standard (AES/AES256)
51
Q

Advanced Encryption Standard (AES)

A

s the default symmetric encryption cipher
for most products. Basic AES has a key size of 128 bits, but the most widely used
variant is AES256, with a 256-bit key.

52
Q

Asyemmetric encryption

A

private and public key

 Message size is limited to key 
size so not suitable for large 
amounts of data
• Used for small amounts of 
authentication data
53
Q

Public Key Cryptography Algorithms

A

RSA algorithm (Rivest, Shamir, Adleman)
• Basis of many public key cryptography schemes
• Trapdoor function
• Easy to calculate with the public key, but difficult to reverse without the private
key

Elliptic curve cryptography (ECC)
• Concerns about RSA being vulnerable to cryptanalysis
• Another type of trapdoor function
• Can use smaller keys to obtain same security

54
Q

RSA

A

RSA algorithm (Rivest, Shamir, Adleman)
• Basis of many public key cryptography schemes
• Trapdoor function
• Easy to calculate with the public key, but difficult to reverse without the private
key

55
Q

ECC

A

Elliptic curve cryptography (ECC)
• Concerns about RSA being vulnerable to cryptanalysis
• Another type of trapdoor function
• Can use smaller keys to obtain same security

56
Q

Digital Signatures

A
  • Using public key cryptography with hashing
  • Digital signatures provide integrity, authentication, non-repudiation
  • RSA-based digital signatures

Hashing - authentication & non repudiation
RSA - integrity

57
Q

Digital Envelopes and key exchange

A

hybrid - enable large amounts of data. able to send symetric key securely

58
Q

Digital Certificate

A

Certificate authority validates authenticity foy signing

PKI

59
Q

Perferct Foward sectrcy

A

Uses Diffie Hellman key agreemen protocols

Allows two parties to derive the sam secret value that an eaves dropper cannot guess

60
Q

cipher suite and mode of operation

A

In a protocol such as Transport Layer Security (TLS), the requirements to both
authenticate the identity of the server and to encrypt communications between the
server and client need to be fulfilled by separate cryptographic products and cipher
implementations. The combination of ciphers supported is referred to as a **cipher
suite
. The server and client negotiate mutually compatible cipher suites as part of the
TLS handshake.

The final part of a cipher suite determines the bulk encryption cipher. When AES
is selected as the symmetric cipher, it has to be used in a *mode of operation** that
supports a stream of network data.

61
Q

• Unauthenticated encryption

A

• Secret key encryption cannot prove integrity
• Makes cryptographic system vulnerable to insertion and
modification attacks

62
Q

• Authenticated encryption

A

• Message authentication code (MAC)
• Create a hash from combination of the message and a shared
secret
• Implementations vulnerable to padding oracle attacks

63
Q

AEAD

A
  • Authenticated encryption with additional data (AEAD)
  • Counter modes or stream ciphers that do not use padding
  • Associates message with context to prevent replay
64
Q

Integrity (in cryptography)

A

• Using hash functions and message authentication codes to validate messages

65
Q

• Resiliency

A

• Using cryptography to ensure authentication and integrity of control messages

66
Q

Obfuscation (cryptography)

A

• Make something hard to understand
• Encryption can perform this function, but it is very hard to secure an embedded
key
• White box cryptography

67
Q

White box cryptography

A

attempts to protect an embedded key while preserviing functinality of the code - all attempts have been brokent

68
Q

nonce

A

rever reuse the same key value

69
Q

salt

A

random pseudo number. goes with hashing

70
Q

• Man-in-the-Middle (MitM)

A

• Interferes with the public key presented to the client

71
Q

• Downgrade attack

A

• Forces server into using weak protocol versions and ciphers

72
Q

• Key stretching

A
  • Use additional rounds to strengthen keys

* Makes attacker do more work so slows down brute force

73
Q

Entropy

A

Entropy is a measure of disorder. A plaintext will usually exhibit low entropy [salting and stretching increases entropy]

74
Q

Collision

A

Function produces same has value for two different plain texts

75
Q

Birthday attack

A

brute force attack aimed to exploiting collisions in has functions

76
Q

Post quantum

A

when quantum computing become reality

77
Q

lightweight cryptograhy

A

low power devices. encryption take up power

78
Q

Homomorphic Encryption

A

Supports data analytics functions while preserving confidentiality and
privacy

79
Q

Blockchain

A

Expanding list of transactional records (blocks)
• Each block is linked by hashing

  • Public ledger
  • Ledger of transactions performed on a digital asset
  • Peer-to-peer so transactions are public
  • Transactions cannot be deleted or reversed

• Widely used for cryptocurrencies

• Potential uses for financial transactions, online voting systems, identity
management systems, notarization, data storage,

80
Q

Stenography

A

obfuscation

• Concealing messages within a covertext
• Often uses file data that can be manipulated without introducing obvious 
artifacts
•    Image
•    Audio
•    Video
• Covert channels