Malicious Activity Flashcards

1
Q

Network Flood Attack

A

Attempts to send more packets to a single server or host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ping Flood

A

A server is sent too many pings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SYN Flood

A

Initiating multiple TCP sessions but never completes the three-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Permanent Denial of Service (PDOS)

A

Attack which exploits the security flaw by refreshing a firmware, breaking the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fork Bomb

A

Large number of processes is created to use the computer’s resources and processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Distributed Denial of Service (DDOS)

A

A DOS with multiple machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS Amplification Attack

A

Allows an attacker to initiate DNS requests from a spoof IP address to flood a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS Cache Poisoning

A

Involves corrupting the DNS cache data of a DNS resolver with false information; To Fix -> Use DNSSEC to add digital signature to the DNS data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS Tunneling

A

Uses the DNS protocol over Port 53 to encase non-DNS traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain Hijacking

A

Altering domain name registration with the original registant’s consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS Zone Transfer Attack

A

The attackers mimic an authorized system to request and obtain the entire DNS zone data of a domain; Impossible using a public DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Directory traversal

A

A type of injection attack that allows access to commands, files, and directories either connected or not connected to the web documents root directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File Inclusion

A

Allows an attacker to either download files from a arbitrary location or upload an executable or script file to open a backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remember ..\ or ../ is

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File inclusion is

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Execution and Escalation Attack types

A

Arbitrary code execution, remote code execution, Privilege execution, and rootkits

17
Q

Arbitrary Code Execution

A

A vulnerability that allows an attacker to run a code or module that exploits a vulnerability; From the host

18
Q

Remote Code Execution

A

From the internet

19
Q

Privilege Execution

A

When a user accesses or modifies system resources that they are not entitled to normally

20
Q

Privilege Vertical Execution

A

Normal level to higher level

21
Q

Privilege Horizontal Execution

A

One user to another

22
Q

Replay Attack

A

Network based attack that involves malicious repeating or delaying valid data transmissions

23
Q

Cookie Poisoning

A

Modifying the contents of a cookie to be sent to a client’s browser and exploits the vulnerabilities in an application

24
Q

SSL Stripping

A

Tricking the encryption app to use HTTP connection and not HTTPS

25
Injection Attack Types
LDAP, Command, Process, DLL
26
Indicators of Compromise
Data pieces that detect potential malicious activity on a network or system