Malicious Activity Flashcards
Network Flood Attack
Attempts to send more packets to a single server or host
Ping Flood
A server is sent too many pings
SYN Flood
Initiating multiple TCP sessions but never completes the three-way handshake
Permanent Denial of Service (PDOS)
Attack which exploits the security flaw by refreshing a firmware, breaking the device
Fork Bomb
Large number of processes is created to use the computer’s resources and processing power
Distributed Denial of Service (DDOS)
A DOS with multiple machines
DNS Amplification Attack
Allows an attacker to initiate DNS requests from a spoof IP address to flood a website
DNS Cache Poisoning
Involves corrupting the DNS cache data of a DNS resolver with false information; To Fix -> Use DNSSEC to add digital signature to the DNS data
DNS Tunneling
Uses the DNS protocol over Port 53 to encase non-DNS traffic
Domain Hijacking
Altering domain name registration with the original registant’s consent
DNS Zone Transfer Attack
The attackers mimic an authorized system to request and obtain the entire DNS zone data of a domain; Impossible using a public DNS
Directory traversal
A type of injection attack that allows access to commands, files, and directories either connected or not connected to the web documents root directory
File Inclusion
Allows an attacker to either download files from a arbitrary location or upload an executable or script file to open a backdoor
Remember ..\ or ../ is
Directory traversal
File inclusion is
Directory traversal
Execution and Escalation Attack types
Arbitrary code execution, remote code execution, Privilege execution, and rootkits
Arbitrary Code Execution
A vulnerability that allows an attacker to run a code or module that exploits a vulnerability; From the host
Remote Code Execution
From the internet
Privilege Execution
When a user accesses or modifies system resources that they are not entitled to normally
Privilege Vertical Execution
Normal level to higher level
Privilege Horizontal Execution
One user to another
Replay Attack
Network based attack that involves malicious repeating or delaying valid data transmissions
Cookie Poisoning
Modifying the contents of a cookie to be sent to a client’s browser and exploits the vulnerabilities in an application
SSL Stripping
Tricking the encryption app to use HTTP connection and not HTTPS