Module 02: Understanding Cyber Threats, IoCs, and Attack Methodology Flashcards

1
Q

What is a cyber threat?

A

An act in which the adversary attempts to gain unauthorized access to an organization’s network by exploiting communication paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three things are behind a threat?

A

Intent
Capability
Motive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TTP?

A

Part of the capability behind a threat. Tactics, Techniques, and Procedures used to target an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What allows the opportunity of a threat?

A

Security vulnerabilities or weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the typical attack vectors?

A
Cloud computing threats
Viruses and worms
Ransomware
Mobile threats
Botnet
Insider threat
Phishing
Web application threats
IoT threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the formula of an attack?

A

Attack=Motive(goal) + Method (TTPs) + Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does motive originate from?

A

A motive originates out of the notion that the target system stores or processes something valuable, and this leads to a threat of an attack on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are tactics?

A

Strategy followed by an attacker to perform the attack from beginning to end i.e. information gathering for initial exploitation, privilege escalation, lateral movement, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are techniques?

A

Technical methods used by an attacker to achieve intermediate results during the attack i.e. initial exploitation, setting up and maintaining C&C channels, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are procedures?

A

Organizational approach followed by the threat actors to launch an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a vulnerability?

A

The existence of a weakness, design, or implementation error that, when exploited, leads to an unexpected and undesired event compromising the security of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a reconnaissance attack?

A

Attackers attempt to discover target network’s information to gain as much knowledge as possible around open ports, services, IPs, network layout etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common reconnaissance methods?

A

Social engineer
Port scanning
DNS footprinting
Ping sweeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two types of reconnaissance attacks?

A

Active and Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are five types of network level attacks?

A
Packet sniffing
Port scanning
Ping sweeping
DNS footprinting
Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of attack is used to check for live hosts, services, ports, etc.

A

Network scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a popular network scanning tool?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What process checks what services are running on a target computer by sending a sequence of messages?

A

Port scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the various network level attacks?

A

Reconnaissance
Network scanning
Port Scanning
DNS Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What attack allows the attacker to determine key hosts in the network and perform social engineering attacks?

A

DNS footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This process monitors and captures all data packets passing through a given network using sniffing tools

A

Network sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What often allows an attacker to perform network sniffing on a network?

A

Unsecured switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three types of network sniffing?

A

Internet
External
Wireless

24
Q

What type of attack involves setting up a station between the client and server to capture and manipulate the traffic/session?

A

Man-in-the-middle attack

25
What types of communication are susceptible to MiTM attacks?
Login functionality Unencrypted comms Financial sites
26
What type of password attack involves using a file of common words, phrases, etc. against an application?
Dictionary attack
27
This type of password attack tries every combination until the password is cracked.
Brute force
28
It works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password
Hybrid attack
29
It attacks cryptographic hash functions based on the probability that if a hashing process is used for creating a key, then the same is used for other key
Birthday attack
30
It attacks rainbow tables that store pre-computed hash values in plaintext
Rainbow table attack
31
What is privilege escalation?
An attacker performs a privilege escalation attack which takes advantage of design flaws, programming errors, bugs, and configuration oversights in the OS and software application to gain administrative access to the network and its associated application
32
Unauthorized manipulation of IP addresses in the domain naming server cache is known as what?
DNS poisoning
33
What is the goal of DNS poisoning?
Re-direct users to malicious sites
34
What is ARP poisoning?
ARP poisoning is an attack in which the attacker tries to associate their own MAC address with the victim’s IP address so that the traffic meant for that IP address is sent to the attacker.
35
What is a DHCP starvation attack?
Process of inundating DHCP servers with fake DHCP requests resulting in all available IP addresses being used.
36
What is a DHCP spoof attack?
Process of implementing a rogue DHCP server and serving requests to clients.
37
What type of attack involves sending large amounts of traffic to target network than it can handle, resulting in exhaustion of resources?
Network-based denial of service attack
38
What are four types of network based DOS attacks?
TCP SYN Flooding ICMP Smurf Flooding UDP Flooding Intermittent Flooding
39
This type of attack floods the target and does not respond with the expected ACK
TCP SYN Flooding
40
This type of attack sends an ICMP echo broadcast and spoofs the source to be the target IP resulting in them being flooded.
ICMP Smurf Flooding
41
What is a Distributed Denial of Service attack?
A DOS attack that involves many compromised systems i.e. botnets to carry out the attack.
42
What are the two types of DDoS?
Network-centric - overloads service by consuming bandwidth | Application-centric - overloads service by sending inundate packets
43
What is malware?
Malicious software that aim to disrupt service, gather sensitive information, damage systems, etc. Typically installed without the user's knowledge.
44
This type of malware is a program that can duplicate itself by making copies of itself. It can only spread from one PC to another when its host is taken to the uncorrupted computer.
Virus
45
This type of malware can replicate through a network on its own.
Worm
46
This type of virus is coded with different mechanisms to make its detection difficult.
Armored virus
47
A malicious program that masquerades as legitimate software.
Trojan
48
A software program that tracks the user’s browsing patterns for marketing purposes and displaying advertisements. It collects the user’s data, such as what types of Internet sites the user visits in order to customize the adverts that are relevant to the user.
Adware
49
A software program that hides its activities from detection and performs malicious activities to get privileged access to a target computer.
Rootkit
50
This malware changes its signature to avoid pattern matching detection by antivirus programs.
Polymorphic malware
51
A type of network attack, where an attacker gains unauthorized access to a target network and remains there undetected for a long period of time
APT - Advanced Persistent Attack
52
What is the main goal of an APT?
To obtain sensitive information
53
What are the characteristics of APT?
``` Objectives Timeliness Resources Risk Tolerance Skills and Methods Actions Attack Origination Points Numbers Involved in the Attack Knowledge Source Multiphased Tailored to the Vulnerabilities Multiple Points of Entries Evading Signature-Based Detection Systems Specific Warning Signs ```
54
What is the APT threat lifecycle?
``` Preparation Initial Intrusion Expansion Persistence Search and Exfiltration Cleanup ```
55
What are the main types of host-level attacks?
Malware infection Accidental or intentional deletion of data Unauthorized access
56
Where do host-level attacks come from?
``` Un-patched computers Email Blended threats Network file shares Social engineering Internet downloads ```