Section 1 – Attacks, Threats, and Vulnerabilities Flashcards

1
Q

Typosquatting

A

Also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

URL hijacking

A

Targeting people on the internet who incorrectly type a website’s domain name in the browser.

Scammers register domain names that may seem similar to the original brand name, except there is a small typo in the domain that can be easily missed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prepending

A

When an attacker prepends, or attaches, a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order to make the message appear more trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretexting

A

Is a form of social engineering in which an attacker gets access to information, a system or a service through deceptive means. The attacker will present a false scenario — or pretext — to gain the victim’s trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

A

redirects internet users to fake websites to steal user data. It’s generally carried out by using one of the following techniques: Malware, DNS cache poisoning, Host file modification, Rogue DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vishing

A

Is short for “voice phishing,” which involves defrauding people over the phone, enticing them to divulge sensitive information. In this definition of vishing, the attacker attempts to grab the victim’s data and use it for their own benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smishing

A

Is a form of phishing, which uses social engineering to trick someone into revealing private information. However, the attack is executed using a text message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reconnaissance

A

Gather information on the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spear phishing, whaling

A

Is a strategic phishing attack, targeted towards high profile executives, that is disguised as a permitted email. An attacker can prod the target for information that helps them access sensitive areas of the network, passwords, or other user information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Impersonation

A

Is a type of targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data from unsuspecting employees using social engineering tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hoaxes

A

Is a fake warning about a virus or other piece of malicious code. Typically a hoax takes the form of an e-mail or other message warning the reader of a dangerous new virus and suggesting that the reader pass the message on.
Hoaxes cause no damage in themselves, but their distribution by well-meaning people often causes fear and uncertainty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering hole attack

A

Is a form of cyberattack that targets groups of users by infecting websites that they commonly visit.
Watering hole attacks are relatively rare, but they continue to have a high success rate. That is because they target legitimate websites that cannot be blacklisted, and cyber criminals deploy zero-day exploits that antivirus detectors and scanners will not pick up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware types

A

Virus, Crypto, Ransomware, Worms, Trojan Horse, Rootkit, Keyloggers, Adware/Spyware, Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Horse

A

SW pretends to be something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rootkit

A

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worms

A

Uses the network as a transmission media, replicates by itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus vs Worm?

A

Virus needs to be executed, Worm replicates automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spraying attack

A

brute force logins based on list of usernames with default passwords on the application. An attacker will use one password against many different accounts on the application to avoid account lockouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rainbow table

A

tables of reversed hashes used to crack password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Password salting

A

technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Skimming

A

Skimming occurs when devices illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps capture data or record cardholders’ PINs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Birthday attack

A

Type of brute force attack. Is a form of cryptographic attack that cracks mathematical algorithms by looking for matches in the hash function. The strategy relies upon the birthday paradox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Downgrade attack

A

is an attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Collision (hash)

A

When two inputs producing the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Man-in-the-middle attack

A

this attack constitutes an interception of a data transfer or other digital communication. By doing this, the attacker gains access to exchanges that are supposed to be secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data Execution Prevention (DEP)

A

a system-level memory protection feature that is built into the operating system starting with Windows XP and Windows Server 2003. DEP enables the system to mark one or more pages of memory as non-executable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cross-site Scripting (XSS) attacks

A

are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Pass-the-Hash attack

A

an attacker captures a password hash (as opposed to the password characters) and then simply passes it through for authentication and potentially lateral access to other networked systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Replay attack

A

occurs when transmitted authentication or access control information is intercepted and then re-transmitted to either produce an unauthorized effect or gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Session hijacking attack

A

compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Web Application Firewall (WAF)

A

filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

reverse proxy

A

sits in front of one or more web servers, intercepting requests from clients. Helps with Load balancing, Protection from attacks, Global Server Load Balancing, Caching, SSL encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Zero-day attack

A

happens once that flaw, or software/hardware vulnerability, is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Shimming (ATM)

A

fraudsters insert a “shim” into the card reader that allows them to copy the chip-card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SSL stripping attacks

A

(also known as SSL downgrade or HTTP downgrade attacks) are a type of cyber attack in which hackers downgrade a web connection from the more secure HTTPS to the less secure HTTP.
They act as a man in the middle by establishing their own HTTPS connection with the website (posing as the user) and maintaining the HTTP connection with the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Eavesdropping attack

A

also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device.

36
Q

Time-of-check Time-of-use (TOCTOU)

A

a class of software bugs caused by a race condition involving the checking of the state of a part of a system (such as a security credential) and the use of the results of that check.

37
Q

Null-pointer dereference

A

A null-pointer dereference takes place when a pointer with a value of NULL is used as though it pointed to a valid memory area, typically causing a crash or exit.

38
Q

Directory traversal

A

(also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files. In some cases, an attacker might be able to write to arbitrary files on the server

39
Q

Input sanitization

A

A measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and strings to prevent the injection of harmful codes into the system.

40
Q

Cross-Site Request Forgery (CSRF)

A

CSRF (also XSRF, or one-click attack, or session riding) an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. With a little help of social engineering, an attacker may trick the users of a web application into executing actions of the attacker’s choosing.

41
Q

Server-side request forgery

A

SSRF is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location.

42
Q

Shimming (drivers)

A

is additional code that can be run instead of the original driver. When an application attempts to call an older driver, the operating system intercepts the call and redirects it to run the shim code instead.

43
Q

Refactoring (drivers)

A

set of techniques used to identify the flow and then modify the internal structure of code without changing the code’s visible behavior

44
Q

Resource exhaustion

A

computer security exploits that crash, hang, or otherwise interfere with the targeted program or system. They are a form of denial-of-service attack

45
Q

Advanced persistent threat (APT)

A

An attack campaign in which an intruder establishes an illicit, long-term presence on a network in order to mine highly sensitive data

46
Q

State actors

A

Operating on behalf of nation-states primarily use cyber threat activity to advance their geopolitical objectives. They are frequently the most sophisticated threat actors, with dedicated resources and personnel, and extensive planning and coordination.

47
Q

Hacktivists

A

Carry out ideologically motivated cyber threat activity and are generally lower sophistication than state-sponsored cyber threat actors or organized cybercriminals. These actors, alongside terrorist groups and thrill-seekers, often rely on widely available tools that require little technical skill to deploy.

48
Q

Shadow IT

A

The use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization. It can encompass cloud services, software, and hardware.

49
Q

Evil twin vs rogue AP

A

A rogue AP is an illegitimate access point plugged into a network to create a bypass from outside into the legitimate network. By contrast, an evil twin is a copy of a legitimate access point.

50
Q

Bluesnarfing attack

A

Happen when your Bluetooth is on and set on “discoverable to others” mode. To launch a Bluesnarfing attack, the attacker needs to exploit the object exchange protocol (OBEX protocol) to exchange information between the wireless devices

51
Q

Bluejacking

A

Sends unsolicited messages to bluetooth-enabled devices

52
Q

Automated indicator sharing

A

Enables the real-time exchange of machine-readable cyber threat indicators and defensive measures to help protect participants of the AIS community and ultimately reduce the prevalence of cyberattacks.

53
Q

Structured Threat Information Expression

A

STIX is a language and serialization format used to exchange cyber threat intelligence (CTI)

54
Q

Trusted Automated eXchange of Intelligence Information

A

TAXII is a collection of services and message exchanges to enable the sharing of information about cyber threats across product, service and organizational boundaries

55
Q

Adversarial Tactics, Techniques, and Common Knowledge

A

MITRE ATT&CK is a guideline for classifying and describing cyberattacks and intrusions. It was created by the Mitre Corporation and released in 2013. The framework consists of 14 tactics categories consisting of “technical objectives” of an adversary

56
Q

Threat (intelligence) feeds

A

Is an ongoing stream of data related to potential or current threats to an organization’s security. TI feeds provide information on attacks, including zero-day attacks, malware, botnets and other security threats.

57
Q

Intelligence fusion

A

A fusion center is an effective and efficient mechanism to exchange information and intelligence, maximize resources, streamline operations, and improve the ability to fight crime and terrorism by merging data from a variety of sources.

58
Q

Common Vulnerability Scoring System (CVSS)

A

Is a method used to supply a qualitative measure of severity. CVSS is not a measure of risk. CVSS consists of three metric groups: Base, Temporal, and Environmental. The Base metrics produce a score ranging from 0 to 10, which can then be modified by scoring the Temporal and Environmental metrics.

59
Q

Reconnaissance in pentesting

A

A discovery phase to gather information about available systems on the network and how they’re configured.

60
Q

Vulnerability Assessment in pentesting

A

A comprehensive assessment which identifies misconfigured systems, outdated software, and other vulnerabilities that could be leveraged to compromise a system or the network.

61
Q

Exploitation in pentesting

A

Vulnerabilities are reviewed and tested to determine if they can be exploited to gain unauthorized access, extract data, or move throughout the network.

62
Q

Risk Determination in pentesting

A

An assessment of each verified vulnerability is performed to determine the likelihood of compromise and the potential impact on the organization.

63
Q

White Box pentesting

A

Also known as clear-box, open-box, auxiliary and logic-driven testing. Penetration testers are given full access to source code, architecture documentation and so forth. The main challenge is sifting through the massive amount of data available to identify potential points of weakness, making it the most time-consuming type of penetration testing.

64
Q

Black-box pentesting

A

The penetration tester is placed in the role of the average hacker, with no internal knowledge of the target system. Testers are not provided with any architecture diagrams or source code that is not publicly available. A black-box penetration test determines the vulnerabilities in a system that are exploitable from outside the network.

65
Q

Gray-box pentesting

A

A gray-box tester has the access and knowledge levels of a user, potentially with elevated privileges on a system. Gray-box pentesters typically have some knowledge of a network’s internals, potentially including design and architecture documentation and an account internal to the network.

66
Q

Rules of engagement in pentesting

A

ROE are meant to list out the specifics of your penetration testing project to ensure that both the client and the engineers working on a project know exactly what is being testing, when its being tested, and how its being tested.

67
Q

Lateral movement in pentesting

A

Is a technique to progressively move through a network, after compromising an endpoint, to search for the key data and assets that are ultimately the target of an attack campaign.

68
Q

Persistence in pentesting

A

Is a technique widely used by red teaming professionals and adversaries to maintain a connection with target systems after interruptions that can cut off their access

69
Q

Pivoting in pentesting

A

Is the use of one infected computer to attack a different computer. This is done to avoid restrictions such as firewalls.

70
Q

Wardriving

A

is locating and logging onto open wireless access points while driving down streets

71
Q

Warflying

A

Is where a person uses a drone to detect unsecured wireless networks.

72
Q

Footprinting

A

Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system - profiling an organization, gathering information about the host, network and people related to the organization.

73
Q

Red vs Blue teams

A

Red Teams are offensive security focused. They simulate how a possible attacker would attack cybersecurity defenses.
Blue Teams are defense focused. They architect and maintain the protective internal cybersecurity infrastructure.

74
Q

Purple Teams

A

(Blue Red Teams) are both offensively and defensively minded and were designed to ensure holistic and synergistic operations and information exchange between attackers and company defenders. Typically purple teams aren’t really a team at all, rather a collaborative agreement between red and blue teams.

75
Q

Black team

A

Is a phrase used to describe a physical penetration test.

76
Q

White team

A

Is responsible for refereeing an engagement between a Red Team (attackers) and a Blue Team (defenders) in an enterprise set up with information and systems. The white team acts as a judge by enforcing rules during the exercise and scoring the other groups. Besides, the team ensures that the activities of Red and Blue Teams run fairly without causing operational problems.

77
Q

SPIM

A

Spam over IM

78
Q

Dumpster driving

A

Entails threat actors to search through a victim’s trash

79
Q

Social Engineering Principles

A

Authority, Intimidation - intimidate a victim by trying to appear superior
Consensus / Social Proof - convinces victims they can be trusted
Scarcity - false urgency
Familiarity/Liking, trust - use charisma or likeability to get a victim to complete a request

80
Q

Potentially unwanted programs (PUPs)

A

A PUP serves as a marketing tool and often modifies browser settings or displays unwanted advertisements. The most common form of PUP is adware.

81
Q

Fileless virus

A

Is malicious code that works directly within a computer’s memory instead of the hard drive. It uses legitimate, otherwise benevolent programs to compromise your computer instead of malicious files.

82
Q

Command and Control attack

A

Attack that involves tools to communicate with and control an infected machine or network. To profit for as long as possible from a malware attack, a hacker needs a covert channel or backdoor

83
Q

Logic bombs

A

A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious.

84
Q

API attacks

A

Malicious usage of an API from automated threats such as access violations, bot attacks or abuse.

85
Q

Pass-the-Hash (PtH) attack

A

A technique where an attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access to other networked systems.

86
Q

Initialization vector in WEP

A

It performs an integrity check to ensure that packets are not modified in transit. For this, it uses a 24-bit IV. The IV is included in the packet in the cleartext part of a message. Its goal is to ensure that two ciphertexts are not encrypted with the same key stream.

87
Q

Maneuver (Threat hunting)

A

How to think like a malicious user to help you identify potential indicators of compromise in your environment.