Network + Ch1 Flashcards
What is Typosquatting?
URL hijacking where a malicious domain mimics a legitimate one(g00gle vs google.com)
How does Pretexting work?
The attacker creates a false story to trick a victim into giving up sensitive information.
What is Pharming?
A poisoned DNS redirects users to fake websites instead of legitimate ones.
What is Vishing?
Voice phishing using spoofed numbers to extract information via phone calls.
What is the difference between Smishing and Spear Phishing?
Smishing is phishing through SMS, while Spear phising is a targeted phishing attack on specific individuals.
What is Whaling?
A form of spear phishing targeting high-profile individuals, like CEOs or executives
Define Watering Hole Attack
Infects websites commonly visited by a specific group to target those users.
What is Tarpitting?
Intentionally slowing down server responses to discourage spam or malicious attacks
What makes a Worm different from a Virus?
A worm self-replicates without user interaction, while a virus requires user action to spread.
What is a Fileless Virus?
Malware that runs in memory without leaving files on the disk, making it hard to detect?
How can you protect against Ransomware?
Maintain offline backups not connected to the system.
What is a Logic Bomb?
Malicious code triggered by a specific event or date
What is a Spraying Attack?
An attack using common passwords only a few times to avoid detection or lockout
What are Rainbow Tables used for?
Precomputed hash chains used to crack passwords quickly
What is a Birthday Attack?
An attack that exploits hash collisions to find two inputs with the same hash
What is Cross-Site Scripting(XSS)?
An attack that injects JavaScript into a website to steal information or manipulate content.
What is the difference between Persistent and Non-Persistent XSS?
Persistent XSS stores malicious scripts permanently on the website, while Non-Persistent XSS injects them temporarily
What is an LDAP Injection Attack?
An attack that manipulates LDAP queries to access unauthorized data
What is Pass the Hash?
A replay attack where an intercepted hash is reused to authenticate without cracking it.
What is Bluejacking?
Sending unsolicited messages over Bluetooth to other devices
What is Bluesnarfing?
Accessing data from a mobile device via Bluetooth without permission
What are Rules of Engagement in penetration testing?
They define the scope, purpose, and limitations of a penetration test
What is Wardriving?
Driving around to search for open WiFi networks using specialized tools.
What is UEBA used for?
User and Entity Behavior Analytics monitors network activity to detect unusual behavior patterns
What is SOAR?
Security Orchestration, Automation and Response automates repetitive security tasks and responses