N2K - Flash Cards - Threats, Vulnerabilities, and Mitigations - Explain Common Threat Vectors and Attack Surfaces
What is bluejacking?
An attack that sends unsolicited messages over a Bluetooth Connection
What is the greatest security risk of instant messaging (IM)?
Sender Impersonation
Which type of attack targets a more vulnerable company or resource that provides your company with third-party products or services?
Supply Chain Attack
What is the risk of default credentials?
They are well-known and easily exploited by attackers when left unchanged
What is impersonation or pretexting?
When an attacker presents as someone else to gain access to information
Which threat vector is exemplified by creating bogus content resembling trusted logos and emblems to deceive users?
Brand Impersonation
Which attack surface type introduces malware or unauthorized access to systems through USB drives or external storage?
Removable Device
Which tool is used to automate spoofing or cloning Bluetooth devices and can allow one to spoof the MAC address of a given device?
Spooftooph (Kali Linux)
What is the term for the types of attacks that include impersonation, pretexting, vishing and smishing?
Human Vectors / Social Engineering
What is the purpose of an airgap?
To ensure that a secure computer network is physically isolated from unsecured networks
Which Bluetooth attack targets IoT devices?
Bluetooth Low Energy (BLE) Attack
What is bluesnarfing?
the act of gaining unauthorized access to a device (and the network it is connected to) through its Bluetooth Connection
What is SMS phishing?
A phishing attack that uses SMS or text messages to send malware or malicious links to mobile devices
How does a supply-chain attack work?
Hackers compromise a third-party managed service provider (MSP) and use their access to the company network to leverage an attack on the target company once inside their network.
Which type of threat vector is exemplified by concealing malicious code within JPG files to exploit vulnerabilities in software or deceive users?
Image-Based
What is the purpose of using a sandbox when testing applications?
It runs untested or untrusted software from unverified or untrusted third parties, suppliers, users, or websites in an isolated environment
Which vulnerable software classification does not require the installation of software or applications on user devices?
Agentless
Which vulnerability occurs when vendors are inconsistent with releasing updates needed to patch security issues?
Patching Fragmentation
What are some examples of social engineering attacks?
Spoofing
Misrepresentation
Dumpster Diving
When automating next steps after a port scan, what typically are the next steps?
Probing the open service ports for vulnerabilities, checking and recording configurations present, and producing a report on the configurations
Which Bluetooth attack sends unsolicited messages over a Bluetooth connection?
Bluejacking
What is the most effective way to prevent social engineering attacks?
User Training
What is spimming?
An instance of spam sent over an instant message (IM) application
What is a command injection attack?
An attack in which an attacker tries to execute commands via a vulnerable software application that the attacker is not supposed to be able to execute on a system
To what does social engineering refer?
Social engineering refers to an attacker’s attempt to obtain sensitive information by using deception and fraud or by manipulating common human traits like trust and greed.
What is vishing?
A special type of phishing that uses Voice over IP (VOIP)
When does smishing occur?
When hackers send fake text messages to trick users into clicking bogus links
Which type of threat vector delivers malicious content through email attachments?
File-Based
Which threat vector consists of exploiting social engineering tactics or vulnerabilities to deceive or manipulate targets over phone communications?
Voice Calls
Which vulnerable software classification requires the installation of software or applications on user devices?
Client-Based
Why would an attacker alter an email header?
To obscure the sender’s identity and perform impersonation
What is another name for voice phishing?
Vishing
What does removable media control prevent?
Infection from malicious files found on USB drives, SD cards, CDs, DVDs, and other removable devices
Unauthorized copying or removal of project files
To which two attacks are bluetooth networks susceptible?
Bluejacking and Bluesnarfing
What occurs when an attacker profiles and compromises websites that the intended victim accesses?
Watering Hole Attack
What is the term for the act of gaining unauthorized access to a device (and the network it is connected to) through its Bluetooth connection?
Bluesnarfing
What are the three most common message-based threat vectors?
Email
Short Message Service (SMS)
Instant Messaging (IM)
What is an Xmas Attack?
An attack that looks for open service ports
What is voice phishing?
A phishing attack that uses voice calls to trick a victim into revealing information
Which threat vector arises from unpatched vulnerabilities that are exploited by attackers due to lack of updates or support?
Unsupported systems/applications or legacy systems