Malicious Activity Flashcards

1
Q

What are the evolving concerns in the digital age?

A

Cyber attacks, increasing in frequency and sophistication

The digital landscape is constantly changing, resulting in new and more advanced cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the first step to effective prevention and mitigation of cyber threats?

A

Understanding Cyber Threats

Awareness of the tactics, techniques, and procedures employed by cybercriminals is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the variants of Distributed Denial of Service (DDoS) attacks?

A
  • Denial of Service
  • Amplified DDoS
  • Reflected DDoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of Domain Name Server (DNS) attacks?

A
  • DNS Cache Poisoning
  • DNS Amplification
  • DNS Tunneling
  • Domain Hijacking
  • DNS Zone Transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Directory Traversal Attack?

A

Injection attack when attacker inserts malicious cose through an application interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a Privilege Escalation Attack involve?

A

Exploiting system vulnerability to gain elevated access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Replay Attack?

A

Malicious or fraudulent repeat/delay of a valid data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Session Hijacking?

A

Attacker takes over a user session to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Malicious Code Injection Attacks?

A

Introduction of harmful code into a program or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some Indicators of Compromise (IoC)?

A
  • Account lockout
  • Concurrent session usage
  • Blocked content
  • Impossible travel
  • Resource consumption
  • Inaccessibility
  • Out-of-cycle logging
  • Published documents indicating hacking
  • Missing logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial of Service (DoS) attack?

A

An attack that attempts to make a computer or server’s resources unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Flood Attack?

A
  • Ping Flood
  • SYN Flood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Permanent Denial of Service (PDOS) Attack?

A

Exploits security flaws to break a networking device permanently by re-flashing its firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Fork Bomb?

A

Attack creates a large number of processes, consuming processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Distributed Denial of Service (DDoS) attack?

A

Malicious attempt to disrupt the normal functioning of a network by overwhelming it with a flood of internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a DNS Amplification Attack?

A

Allows an attacker to initiate DNS requests from a spoof IP address to flood a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a Black Hole or Sinkhole in DoS prevention?

A

Routes attacking IP traffic to a non-existent server through a null interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is DNS Cache Poisoning?

A

Corrupts a DNS resolver’s cache with false information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is DNS Tunneling?

A

Encapsulates non-DNS traffic over port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Domain Hijacking?

A

Unauthorized change of domain registration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Directory Traversal Attack?

A

An injection attack that allows access to commands, files, and directories

22
Q

What is Arbitrary Code Execution?

A

Vulnerability that allows an attacker to run their code without restrictions

23
Q

What is Remote Code Execution?

A

Type of arbitrary code execution that occurs remotely

24
Q

What is the difference between Vertical and Horizontal Privilege Escalation?

A
  • Vertical: From normal user to higher privilege
  • Horizontal: Accessing resources at the same level
25
Q

What are rootkits?

A

Class of malware that conceals its presence by modifying system files

26
Q

What is a Replay Attack?

A

Type of network-based attack where valid data transmissions are maliciously re-broadcast

27
Q

What is a Credential Replay Attack?

A

Capturing a user’s login credentials during a session and reusing them for unauthorized access

28
Q

How can Replay Attacks be prevented?

A
  • Use session tokens
  • Implement multi-factor authentication
  • Use security protocols like WPA3
29
Q

What is Session Management?

A

Enables web applications to uniquely identify a user across different actions

30
Q

What is a Cookie in web applications?

A

Text file used to store information about a user when they visit a website

31
Q

What is Cookie Poisoning?

A

Modifies the contents of a cookie after it has been generated

32
Q

What is an On-Path Attack?

A

An attack where the attacker positions their workstation logically between two hosts

33
Q

What is ARP Poisoning?

A

Manipulating Address Resolution Protocol (ARP) tables to redirect network traffic

34
Q

What is SSL Stripping?

A

An attack that tricks the encryption application into presenting an HTTP connection instead of HTTPS

35
Q

What is LDAP Injection?

A

An application attack that targets web-based applications by fabricating LDAP statements

36
Q

What is Command Injection?

A

Occurs when a threat actor is able to execute arbitrary commands on a system

37
Q

What does LDAP stand for?

A

Lightweight Directory Access Protocol

LDAP is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.

38
Q

What is LDAP Injection?

A

An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input

Protection against LDAP injection attacks includes input validation and input sanitization.

39
Q

What is Command Injection?

A

Occurs when a threat actor is able to execute arbitrary shell commands on a host via a vulnerable web application

40
Q

What is Process Injection?

A

Method of executing arbitrary code in the address space of a separate live process

There are many different ways to inject code into a process, including DLLs, Thread Execution Hijacking, and Process Hollowing.

41
Q

List some methods of Process Injection.

A
  • Injection through DLLs
  • Thread Execution Hijacking
  • Process Hollowing
  • Process Doppel Ganging
  • Asynchronous Procedure Calls
  • Portable Executable Injections
42
Q

What are some mitigation strategies for Process Injection?

A
  • Endpoint security solutions configured to block common sequences of attack behavior
  • Security Kernel Modules
  • Practice of Least Privilege
  • Indicators of Compromise (IoC)
43
Q

What does Indicators of Compromise (IoC) refer to?

A

Pieces of forensic data that identify potentially malicious activity on a network or system

IoCs serve as digital evidence that a security breach has occurred.

44
Q

What is an Account Lockout?

A

Occurs when an account is locked due to multiple failed login attempts

It indicates a potential brute force attack to gain access.

45
Q

What is Concurrent Session Usage?

A

Refers to multiple active sessions from a single user account

It may indicate a possible account compromise.

46
Q

What does Blocked Content imply?

A

Involves attempts to access or download content blocked by security protocols

This suggests a user trying to access malicious content or an attacker attempting to steal data.

47
Q

What does Impossible Travel indicate?

A

Detects logins from geographically distant locations within an unreasonably short timeframe

It indicates a likely account compromise.

48
Q

What is Resource Consumption?

A

Unusual spikes in resource utilization

This includes CPU, Memory, and Network bandwidth, and may indicate malware infections or DDoS attacks.

49
Q

What is Resource Inaccessibility?

A

Inability to access resources like files, databases, or network services

It suggests a ransomware attack, where files are encrypted, and a ransom is demanded.

50
Q

What does Out-of-Cycle Logging indicate?

A

Log entries occurring at unusual times

It suggests an attacker trying to hide their activities during off-peak hours.

51
Q

What are Missing Logs a sign of?

A

Sign that logs have been deleted to hide attacker activities

This may result in gaps in the log data, making it harder to trace the attacker’s actions.

52
Q

What does the publication of Articles or Documents by attackers imply?

A

Attackers publicly disclose their actions, boasting about their skills or causing reputational damage

This can occur on social media, hacker forums, or the victim’s own website.