Securing Individual Systems Flashcards

1
Q

Phishing

A

Unsolicited emails that typically request info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spear phishing

A

Similar to phishing but it uses details it knows about you to look legit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Snapshot

A

System image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does rollback refer to?

A

Small part of a system

Ex: rolling back a driver or app version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DOS

-Attacks can be broadly broken down into volumetric, protocol, and application attacks

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is session hijacking?

A

Two clients talking to each other and you get in the middle of them in real time - Like MIM but real time during their session
ex: FireSheep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an application Attack?

-Also known as a slow loris attack

A

Client initiates communication with server but then stops replying over and over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vishing

A

Voice based solicitations requesting info about you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Live Boot Media

A

Ex: Ubuntu disk being able to boot up with a runable version

  • Example of non-persistence
  • Persistence would be actually installing it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MIM

  • 3rd party intercepting between a two party conversation
  • Uses information to the third party’s advantage
A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domain Jacking

A

Waiting for someones domain contract to end and buying their website name to change it and try to resell it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a botnet?

A

Group of computers with malware on them that can be controlled by one computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Elasticity

A

Able to scale up temporarily to handle more traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a volumetric attack?

A

Ping or UDP’s being sent to server in large amounts without giving server time to respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distributive Allocations

A

Have backups in different locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-Persistance

A

Being able to go back to a known state - data that is collected but will not be saved on restart

17
Q

DDOS

-Uses multiple systems to attack a single host

A

Distributed Denial of Service

18
Q

Type of attack where you use a username and password hash to enter it as the user without having to even crack it

A

Replay Attack

19
Q

Sending malicious ARP packets to default gateway

-this can change the ARP to think you are a different computer on the network

A

ARP Poisoning or ARP Spoofing

20
Q

Spim

A

Phishing but in instant messenger services

21
Q

What is Ettercap?

A

A spoofing tool

22
Q

Typo Squatting

A

Making a website close to another in hopes people will mistype and end up on your
ex: www.gogle.com

23
Q

What is a protocol attack?

A

SYN flood / TCP SYN attack

-floods server with SYN requests

24
Q

Type of attack where you act as a client to downgrade encryption to a web server

A

Downgrade Attack

25
Q

What is an Amplification Attack?

-Smurf Attack

A

Attacker spoofs website IP address and sends out broadcast to network - networks all start replying back to target - this generates a lot of packets being sent around to network just by sending one packet in

26
Q

Using Fake information to fool someone

ex: making your IP address appear to be someones elses so that another computer will trust you

A

Spoofing

27
Q

Denial of service attack is what?

A

Prevents others from access a system

28
Q

Privilege Escalation

A

Getting enough privilege to do something that can cause damage