Security+ Mod 1 & 2 Flashcards
ARP Poisoning
a network-based attack where an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient
Buffer Overflow-
an application attack that exploits fixed data buffer sizes in a target piece of software by sending data that is too large for that buffer.
Clickjacking-
a type of hijacking attack that forces a user to unintentionally click a link that is embedded in or hidden by other web page elements
Collision-
the act of two different plaintext inputs producing the same exact ciphertext output
DDOS-
distributed denial of service attack) a network based attack where an attacker hijacks or manipulates multiple computers on networks to carry out a DoS attack
DDoS (Distributed Denial of Service)
is an attack that uses multiple compromised computers (a “botnet” of “zombies”) to launch the attack.
DLL injection-
a software vulnerability that can occur when a windows based application attempts to force another running application to load a dynamic link library in memory that could cause the victim application to experience instability or leak sensitive information
DNS Poisoning-
Domain name system- a network based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attackers choosing.
Domain hijacking-
a type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity.
DOS-denial of service attack-
a network based attack where the attacker disables systems that provide network services by consuming a networks links available bandwidth, consuming a single systems available resources or exploiting programming flaws in an application or OS.
IV- initialization vector-
a technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption
IV attack-
a wireless attack where the attacker is able to predict or control the IV of an encryption process, this giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user or network.
Jamming-
In networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices.
Attackers may use a radio transceiver to intercept transmissions and inject jamming packets, disrupting the normal flow of traffic across a network.
MAC Spoofing-
an attack in which an attacker falsifies the factory-assigned MAC address of a devices network interface.
Although the MAC address is hard coded on a network interface, there are tools that you can use to make an OS believe that the interface has a different MAC address. MAC spoofing attacks use the MAC address of another host to try and force the target switch to forward frames intended for the host to the attacker. B?C it operates at the Data Link Layer, MAC address spoofing is limited to the local broadcast domain.
Man-in-browser-
a type of network attack that combines a man in the middle attack with the use of a trojan horse to intercept and modify web transitions in real time
Man-in-the-middle-
a form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently.
Memory Leak-
a software vulnerability that can occur when software does not release allocated memory when It is done using it, potentially leading to system instability
Pass the Hash-
a network attack where the attacker steals hashed user credentials and uses them as is to try to authenticate to the same network the hashed credentials originated on.
Pen Testing-
a method of evaluating security by simulating an attack on a system
Pointer Dereference-
a software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to. If the pointee is not properly established, the dereferencing process may crash the application and corrupt memory.
Privilege escalation-
exploiting flaws in an operating system or other application to gain greater level of access than was intended for the user or application
Race Condition-
a software vulnerability that can occur when the outcome of the execution process is directly dependent on the order and timing of certain events and those events fail to execute in the order and timing intended by the developer.
Refactoring-
the process of restructuring application code to improve its design without affecting the external behavior of the application or to enable it to handle particular situations.
Shimming-
the process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable.
URL Hijacking-
an attack in which an attacker registers a domain name with common misspelling of an existing domain so that a user who misspells a URL they enter into a browser is taken to the attackers website
WPS-
Wi-Fi protected setup- an insecure feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN
SSID-
An SSID or service set identifier is used to help users identify the correct WAP they are connecting to. An extended SSID or ESSID is used when multiple SSIDs are grouped into one.
MAC Filtering-
MAC (media access control) filtering specifies a list of valid MAC addresses of devices that will be allowed to connect to the WAP (wireless access point).
ACL-
access control list- On a router, a list that is used to filter network traffic and implement anti-spoofing measures. In a DAC access control scheme, a list that is associated with each object, specifying the subjects that can access the object and their levels of access.
Active-Active-
a redundancy mode used by load balancers to route traffic equally through two load balancers. An active/active cluster provides Enterprise services to clients from both virtual servers. All services will transparently transfer to the other server if one virtual host goes offline.
Active-Passive-
a redundancy mode used by load balancers to route traffic through a primary (active) load balancer while the other (passive) load balancer is on standby in case of failure of the active device. An active/passive cluster provides Enterprise services to clients from only one virtual server . The other server comes online only when the currently active server goes offline.
ANT-
a proprietary wireless network technology that is similar to Bluetooth implementations that consume a smaller amount of energy.
Banner Grabbing-
the act of collecting information about network hosts by examining text-based welcome screens that are displayed by some hosts. involves opening random connections to common port or network protocols and gathering information from banner or error responses.
OUI (Organizationally Unique Identifier) grabbing
is like banner grabbing or OS fingerprinting. The OUI can identify the manufacturer of the network adapter and therefore, conclude other assumptions related to system type and/or purpose.
Ping-t
-t switch pings the specified server name or IP (Internet protocol) address until stopped. Typing CTL+C on the keyboard will stop the pings.
Ping-n
-n switch sets the number of echo requests to send. The standard send count is four. The number can be specified after the -n switch.
Ping-S
switch, which is a capital S, is used to specify a source address to use that is different from the server that the admin is initiating the ping command from.
Ping-r
switch records route for count hops. This is used for IPv4 addresses.
Netstat-
command allows the admin to check the state of ports on the local machine (Windows or Linux). He or she may also be able to identify suspect remote connections to services on the local host or from the host to remote IP (Internet protocol) addresses.
Tracert-
The trace route (tracert) command can help discover where a network route ends when a ping fails. However, the server is responding to pings.
Ipconfig-
only provides network adapter information such as the IP address of the server.
OS (operating system) fingerprinting
is a method used by Nmap to probe hosts for running OS type and version, and even application names and device type (e.g., laptop or virtual machine).
Zen map-
GUI for Nmap. Use traceroute command to map out network.
Net cat-(or NC for short)
is a remote access software that is available for both Windows and Linux. It can be used as a backdoor to other servers.
Data exfiltration –
the process by which an attacker takes data that is stored inside of a private network and moves it to an external network.
DLP-
data loss/ leak prevention a software solution that detects and prevents sensitive info in a system or network from being stolen or otherwise falling into the wrong hands.
DNSSEC-
Domain Name System Security Extensions- a security protocol that provides authentication of DNS data and upholds DNS data integrity
File Integrity monitoring-
is a feature available in most antivirus software or HIPS (Host-based Intrusion Prevention System). HIPS can capture a baseline of the image, any radical change (like an image) using hashing algorithms, will flag the incident, and quarantine the files.
Hardware Security module-
HSM- a physical device that provides root of trust capabilities
IPSEC- Internet Protocol Security-
a set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the internet.
Load Balancer-
a network device that distributes the network traffic or computing workload among multiple devices in a network.
An active/active
cluster provides Enterprise services to clients from both virtual servers. All services will transparently transfer to the other server if one virtual host goes offline.
An active/passive
cluster provides Enterprise services to clients from only one virtual server. The other server comes online only when the currently active server goes offline.
A URL filter
allows you to control access to websites by permitting or denying access to specific websites based on information contained in a URL list.
NAC-
Network Access Control- the collection of protocols, policies and hardware that govern access of devices connecting to a network. Essentially a health policy that verifies each requesting node conforms to a healthy policy (patch level, antivirus/firewall configuration, and so on).
NIDS-
Network Intrusion detection system- a system that uses passive hardware sensors to monitor traffic on a specific segment of the network. Uses Signature-based (or pattern-matching) detection.
NIPS-
an active, in line security device that monitors suspicious network and or system traffic and reacts in real times to block it.
(Network Intrusion Prevention System) is an appliance placed on the network to provide an active response to any network threats that matches its policies or signatures.
Out-of-Band link-
offers better security than in-band. You may use separate cabling or the same cabling and physical switches, but a separate VLAN for management.
in-band
link is less secure, since the management channel is shared by the network being monitored. This will make alerts more detectable by an adversary and can also be blocked.
Secure Post Office Protocol v3 (POP3)
is a mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient’s email client at their convenience.
Secure Internet Message Access Protocol v4 (IMAP4)
is primarily designed for dial-up access and the client contacts the server to download its messages, then disconnects. IMAP supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously. Messages can be stored and organized on the server.
Protocol Analyzer-
this type of diagnostic software can examine and display data packets that are being transmitted over a network. EX: Wireshark
POP-
a protocol used to retrieve email from a mailbox on the mail server
Proxy-
a device that acts on behalf of one end of a network connection when communicating with the other end of connection
device that acts on behalf of another service. A proxy examines the data and makes rule-based decisions about whether the request should be forwarded or refused.
A proxy examines the data and makes rule-based decisions about whether the request should be forwarded or refused.
A proxy server places information retrieved from the internet into a temporary storage area so that if the information is requested again by another client, the proxy already has it. This reduces the number of calls to the internet and speeds up performance.
Router-
a device that connects multiple networks that use the same protocol.
S/MIME-
Secure/multipurpose internet mail extensions- an email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications
the user is issued a digital certificate containing a public key that is signed by a CA (Certificate Authority) to establish its validity.
SIEM-
a security information and event management- a solution that provides real time or near real time analysis of security alerts generated by network hardware and applications.
Aggregation switches –
a network device that combines multiple ports into a single link in order to enhance redundancy and increase bandwidth
can connect multiple subnets to reduce the number of active ports. When aggregating subnets, the subnets are connected to the switch versus the router.
SNMP
SNMP-simple network management protocol- an application layer services used to exchange information between network devices.