Security+ Mod 1 & 2 Flashcards
ARP Poisoning
a network-based attack where an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient
Buffer Overflow-
an application attack that exploits fixed data buffer sizes in a target piece of software by sending data that is too large for that buffer.
Clickjacking-
a type of hijacking attack that forces a user to unintentionally click a link that is embedded in or hidden by other web page elements
Collision-
the act of two different plaintext inputs producing the same exact ciphertext output
DDOS-
distributed denial of service attack) a network based attack where an attacker hijacks or manipulates multiple computers on networks to carry out a DoS attack
DDoS (Distributed Denial of Service)
is an attack that uses multiple compromised computers (a “botnet” of “zombies”) to launch the attack.
DLL injection-
a software vulnerability that can occur when a windows based application attempts to force another running application to load a dynamic link library in memory that could cause the victim application to experience instability or leak sensitive information
DNS Poisoning-
Domain name system- a network based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attackers choosing.
Domain hijacking-
a type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity.
DOS-denial of service attack-
a network based attack where the attacker disables systems that provide network services by consuming a networks links available bandwidth, consuming a single systems available resources or exploiting programming flaws in an application or OS.
IV- initialization vector-
a technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption
IV attack-
a wireless attack where the attacker is able to predict or control the IV of an encryption process, this giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user or network.
Jamming-
In networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices.
Attackers may use a radio transceiver to intercept transmissions and inject jamming packets, disrupting the normal flow of traffic across a network.
MAC Spoofing-
an attack in which an attacker falsifies the factory-assigned MAC address of a devices network interface.
Although the MAC address is hard coded on a network interface, there are tools that you can use to make an OS believe that the interface has a different MAC address. MAC spoofing attacks use the MAC address of another host to try and force the target switch to forward frames intended for the host to the attacker. B?C it operates at the Data Link Layer, MAC address spoofing is limited to the local broadcast domain.
Man-in-browser-
a type of network attack that combines a man in the middle attack with the use of a trojan horse to intercept and modify web transitions in real time
Man-in-the-middle-
a form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently.
Memory Leak-
a software vulnerability that can occur when software does not release allocated memory when It is done using it, potentially leading to system instability
Pass the Hash-
a network attack where the attacker steals hashed user credentials and uses them as is to try to authenticate to the same network the hashed credentials originated on.
Pen Testing-
a method of evaluating security by simulating an attack on a system
Pointer Dereference-
a software vulnerability that can occur when the code attempts to remove the relationship between a pointer and the thing it points to. If the pointee is not properly established, the dereferencing process may crash the application and corrupt memory.
Privilege escalation-
exploiting flaws in an operating system or other application to gain greater level of access than was intended for the user or application
Race Condition-
a software vulnerability that can occur when the outcome of the execution process is directly dependent on the order and timing of certain events and those events fail to execute in the order and timing intended by the developer.
Refactoring-
the process of restructuring application code to improve its design without affecting the external behavior of the application or to enable it to handle particular situations.
Shimming-
the process of developing and implementing additional code between an application and the operating system to enable functionality that would otherwise be unavailable.