LP - Threat Actors & Vectors Flashcards

1
Q

MaaS stands for

A

Malware as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

APT stands for

A

Advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the phishing variant whaling?

A

It is a spear phishing attack against high-level and highly privileged employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the phishing variant smishing?

A

It uses various text messing formats to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the phishing variant vishing?

A

It uses VoIP or phone as the hoax vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XSS Variant DOM (document object model) -based is also called

A

local XSS or type 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XSS DOM-base involve insecurely written

A

HTML pages or the end users system or local gadets and widgets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Shellcode?

A

A small stub of code used as a payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DLL stands for

A

Dynamic link library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DLL?

A

a shared library of functions that multiple programs can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a process?

A

It is an instance of a program being executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a thread?

A

It is a small sequence of instructions or a component of a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a VirtualAllocEx do?

A

It reserves or changes a region of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shellcode injects malicious code into a running

A

application of powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is process hollowing?

A

It starts a legitimate process whose sole purpose is to be a container for malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Reflective DLL injection?

A

contents of a rogue DLL are injected into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reflected XSS is also called

A

Non-persistent or type 1

18
Q

Reflected XSS is a input

A

trust vulnerability, it is when the the attacker sends something the developer did not expect

19
Q

Stored XSS is also called

A

Persistent or Type 2

20
Q

In stores XSS the web server persists with the

21
Q

CSRF/XSRF stands for

A

Cross-site request forgery

22
Q

CSRF attacks force an end user to

A

perform undesirable actions in a web application in which they are authenticated

23
Q

RCE stands for

A

remote code execution

24
Q

RCE allows for some firmware to be

A

remotely reprogrammed

25
RCE (remote code execution) is also called
field programmable gate arrays
26
Hypervisors manage the
recources and interaction between the VM's and the hardware
27
Type I (bare metal) hypervisors
run directly on the underlying hardware
28
Type II (hosted) runs on the
Installed OS
29
VM sprawl is have
no centralised control of the hypervisors and virtual machines
30
VM hopping is when administrators do not enforce the
partitioning of guests
31
VM escape is
when guest access the underlying hypervisior or hardware
32
Hyperjacking is when a privileged insider installs
malware
33
CSA stands for the
Cloud Security alliance
34
CSA Trecherous 12
1. Data breaches 2. Weak identity, credential and access management 3. Insecure APIs 4. System and application vulnerabilities 5. Account hijacking 6. Malicious insiders 7. Advanced persistent threats (APTs) 8. Data Loss 9. Insufficient due diligence 10. Abuse and nefarious use of cloud services 11. Denial of service 12. Shared technology vulnerabilities
35
Mobile Device vulnerabilities what is - side loading
install an app not from the official app store
36
Mobile Device vulnerabilities what is - Jailbreaking
mainly iPhone, is the act of exploiting a flaw of a locked-down device
37
EMM stands for
Enterprise Mobility Management
38
MDM stands for
Mobile device management
39
MAM stands for
Mobile application management
40
BEC stands for
business email compromise