Network Threats and Attacks Flashcards
_______________ are sophisticated and targeted cyberattacks where a threat actor gains unauthorized access to a network or system and remains undetected for an extended period. These attackers often have specific objectives, such as stealing sensitive data or conducting espionage.
Advanced Persistent Threats (APTs)
_______________ involve exploiting vulnerabilities in APIs to gain unauthorized access or manipulate data. Attackers can use these vulnerabilities to compromise the functionality and security of applications and services.
API (Application Programming Interface) Attacks
_______________ attacks involve manipulating ARP tables to associate a legitimate IP address with a malicious MAC address. This can lead to network traffic being redirected to an attacker-controlled device.
ARP (Address Resolution Protocol) Spoofing & Poisoning
Backdoors are hidden or unauthorized access points in a system or application that allow an attacker to bypass normal authentication and gain control over the system. They are often used for remote access and persistence.
Backdoors
_______________ is a wireless technology used for short-range communication between devices. Bluetooth attacks involve exploiting vulnerabilities in Bluetooth connections to gain unauthorized access or control over connected devices.
Bluetooth
_______________ involve systematically trying every possible combination of passwords or encryption keys until the correct one is found. These attacks are time-consuming but can be effective if passwords are weak.
Brute Force Attacks
_______________ attacks involve impersonating a trusted individual or organization via email to manipulate employees into disclosing sensitive information or conducting fraudulent financial transactions.
Business Email Compromise (BEC)
This refers to security measures and practices aimed at protecting user credentials (e.g., usernames and passwords) from being stolen by attackers.
Credential Theft Prevention
_______________ is a web application vulnerability where malicious scripts are injected into web pages viewed by other users. These scripts can steal data or perform actions on behalf of the victim.
Cross-Site Scripting (XSS)
_______________ is a criminal service where ransomware tools are offered as a service, enabling individuals with limited technical skills to launch ransomware attacks for financial gain.
Crypto Ransomware-as-a-Service (RaaS)
_______________ is the unauthorized use of a victim’s computer or device to mine cryptocurrency. Attackers use malware or scripts to exploit the victim’s computing resources.
CryptoJacking
_______________ is malicious software that encrypts a victim’s files and demands a ransom for decryption. Victims are typically forced to pay to regain access to their data.
Crypto-Malware Attacks
Botnets are networks of compromised devices controlled by an attacker._______________ are used to collectively mine cryptocurrency using the computing power of the compromised devices.
Crypto-Mining Botnets
_______________ involves unauthorized changes to data stored on systems or databases. Attackers may alter, delete, or corrupt data to achieve their objectives.
Data Manipulation
_______________ attacks manipulate the Domain Name System (DNS) to redirect users to malicious websites or intercept their communications.
DNS Spoofing & Cache Poisoning
DNS tunneling is a technique that uses DNS queries and responses to bypass network security controls and exfiltrate data.
DNS Tunneling
_______________ involves attacking the security extensions of DNS to compromise the integrity and authenticity of DNS data.
DNSSEC (Domain Name System Security Extensions) Exploitation
_______________ are algorithms used by malware to generate a large number of domain names dynamically. Attackers use DGAs to evade detection and establish communication with command and control servers.
Domain Generation Algorithms (DGA)
_______________) attacks overload a target system or network with traffic, rendering it unavailable to legitimate users.
DoS & DDoS: Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
_______________ occur when malware is automatically downloaded and installed on a user’s device when they visit a malicious website or interact with malicious content.
Drive-By Downloads
_______________ is a type of attack where a user’s router settings are maliciously modified when they visit a compromised website, redirecting their traffic to attacker-controlled servers.
Drive-By Pharming
_______________ involves intercepting and listening to communications without authorization. _______________ refers to capturing and analyzing network traffic to gain information or exploit vulnerabilities.
Eavesdropping, Sniffling
_______________ in web applications allow attackers to upload malicious files, which can lead to remote code execution or other attacks.
File Upload Vulnerabilities
_______________ operate in memory without leaving traces on disk. They leverage existing system tools and processes to carry out malicious activities.
Fileless Attacks