Section 1 – Attacks, Threats, and Vulnerabilities Flashcards
Typosquatting
Also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser
URL hijacking
Targeting people on the internet who incorrectly type a website’s domain name in the browser.
Scammers register domain names that may seem similar to the original brand name, except there is a small typo in the domain that can be easily missed.
Prepending
When an attacker prepends, or attaches, a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order to make the message appear more trustworthy.
Pretexting
Is a form of social engineering in which an attacker gets access to information, a system or a service through deceptive means. The attacker will present a false scenario — or pretext — to gain the victim’s trust
Pharming
redirects internet users to fake websites to steal user data. It’s generally carried out by using one of the following techniques: Malware, DNS cache poisoning, Host file modification, Rogue DNS servers
Vishing
Is short for “voice phishing,” which involves defrauding people over the phone, enticing them to divulge sensitive information. In this definition of vishing, the attacker attempts to grab the victim’s data and use it for their own benefit
Smishing
Is a form of phishing, which uses social engineering to trick someone into revealing private information. However, the attack is executed using a text message.
Reconnaissance
Gather information on the victim
Spear phishing, whaling
Is a strategic phishing attack, targeted towards high profile executives, that is disguised as a permitted email. An attacker can prod the target for information that helps them access sensitive areas of the network, passwords, or other user information.
Impersonation
Is a type of targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data from unsuspecting employees using social engineering tactics.
Hoaxes
Is a fake warning about a virus or other piece of malicious code. Typically a hoax takes the form of an e-mail or other message warning the reader of a dangerous new virus and suggesting that the reader pass the message on.
Hoaxes cause no damage in themselves, but their distribution by well-meaning people often causes fear and uncertainty.
Watering hole attack
Is a form of cyberattack that targets groups of users by infecting websites that they commonly visit.
Watering hole attacks are relatively rare, but they continue to have a high success rate. That is because they target legitimate websites that cannot be blacklisted, and cyber criminals deploy zero-day exploits that antivirus detectors and scanners will not pick up.
Malware types
Virus, Crypto, Ransomware, Worms, Trojan Horse, Rootkit, Keyloggers, Adware/Spyware, Botnet
Trojan Horse
SW pretends to be something else
Rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
Worms
Uses the network as a transmission media, replicates by itself.
Virus vs Worm?
Virus needs to be executed, Worm replicates automatically
Spraying attack
brute force logins based on list of usernames with default passwords on the application. An attacker will use one password against many different accounts on the application to avoid account lockouts
Rainbow table
tables of reversed hashes used to crack password hashes
Password salting
technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them
Skimming
Skimming occurs when devices illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps capture data or record cardholders’ PINs.
Birthday attack
Type of brute force attack. Is a form of cryptographic attack that cracks mathematical algorithms by looking for matches in the hash function. The strategy relies upon the birthday paradox.
Downgrade attack
is an attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version.
Collision (hash)
When two inputs producing the same hash value
Man-in-the-middle attack
this attack constitutes an interception of a data transfer or other digital communication. By doing this, the attacker gains access to exchanges that are supposed to be secured.
Data Execution Prevention (DEP)
a system-level memory protection feature that is built into the operating system starting with Windows XP and Windows Server 2003. DEP enables the system to mark one or more pages of memory as non-executable.
Cross-site Scripting (XSS) attacks
are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.
Pass-the-Hash attack
an attacker captures a password hash (as opposed to the password characters) and then simply passes it through for authentication and potentially lateral access to other networked systems.
Replay attack
occurs when transmitted authentication or access control information is intercepted and then re-transmitted to either produce an unauthorized effect or gain unauthorized access.
Session hijacking attack
compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.
Web Application Firewall (WAF)
filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others
reverse proxy
sits in front of one or more web servers, intercepting requests from clients. Helps with Load balancing, Protection from attacks, Global Server Load Balancing, Caching, SSL encryption
Zero-day attack
happens once that flaw, or software/hardware vulnerability, is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability
Shimming (ATM)
fraudsters insert a “shim” into the card reader that allows them to copy the chip-card information
SSL stripping attacks
(also known as SSL downgrade or HTTP downgrade attacks) are a type of cyber attack in which hackers downgrade a web connection from the more secure HTTPS to the less secure HTTP.
They act as a man in the middle by establishing their own HTTPS connection with the website (posing as the user) and maintaining the HTTP connection with the user