Security + NET ATTACKS Flashcards

network attacks

1
Q

bluejacking

A

**involves sending unsolicited messages **to Bluetooth-enabled devices, such as laptops, mobile phones, or PDAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bluesnarfing

A

the unauthorized access of information from a wireless device through a Bluetooth connection,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

cyberattack that uses the phone to trick people into sharing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(SPIM) Spam Over Instant Messaging

A

Spam that is sent through instant messaging, SMS, or private messages on websites.

(intrusive ads, spyware, or viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smishing

A

phishing scam that uses text messages to trick people into sharing personal or financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic attack

A

a malicious attempt to exploit a weakness in a cryptographic system and gain unauthorized access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Downgrade attack

A

take advantage of a system’s backward compatibility to force it into less secure modes of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deauthentication attack

A

type of denial-of-service (DoS) attack that disrupts the connection between a wireless device and its Wi-Fi access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial-of-Service

A

attack that aims to disrupt, disable, or shut down a network, website, or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute-force attack

A

a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

` involves disguising information to trick people into believing they are interacting with a trusted source`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replay attacks

A

eavesdropping on network traffic, capturing legitimate communication packets, and then replaying them to the target devic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Eavesdropping

A

used by cyberattackers to intercept communication and steal sensitive data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data interception

A

a type of data theft that involves the unauthorized redirection of information intended for one party to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

on-path attack

A

cyberattack where a malicious actor secretly positions themselves between two devices to intercept or modify communications between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP poisoning

A

cyber attack carried out over a Local Area Network (LAN) that

  • involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS poisoning (Domain Name System )

A

happens when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website

17
Q

Media Access Control (MAC) flooding

A

is a network attack that compromises the security of a network **SWITCH** by overflowing its memory used to store the MAC address table.

18
Q

MAC spoofing

A

a technique for **changing **a factory-assigned Media Access Control (MAC) address of a network interface on a networked device

19
Q

MAC cloning

A

changing or impersonating the MAC address of a network interface card to match the MAC address of an authorized device on the network.

20
Q

Domain hijacking

A

refers to a situation in which domain registrants due to unlawful actions of third parties lose control over their domain names.

21
Q

URL hijacking

A

attackers* take advantage of common typos or misspellings* that users make when typing in the URL of a legitimate site.

22
Q

Pharming

A

cyberattack that redirects a user’s browser to a fake website without their knowledge or consent

23
Q

Typosquatting

A

** involves registering a domain name** that is similar to a legitimate website's but with an intentional typo

24
Q

Directory traversal attacks

A

a **vulnerability **in a web application server caused by a HTTP exploit.

The exploit allows an attacker to access restricted directories, execute commands,

For example, if a website downloads a PDF to a user’s computer using the URL https://www.vulnerable.com/download_file.php?file=document.pdf, the attacker can pass in the file name ../../etc/passwd.

25
Q

OT DDoS attack

A

designed to exploit the systems that are directly on the plant floor.

26
Q

Rogue access point

A

**a wireless access point **that is installed on a network without the network owner's permission

27
Q

Disassociation (WiFi)

A

a normal part of the communication protocol, used to cleanly break the connection between a device and the network.

28
Q

Jamming (WiFi)

A

create traffic jams for the radio transmitter so that real traffic cannot get through,

29
Q

Radio frequency identifier (RFID) _ WiFi

A

a wireless technology that uses radio waves to communicate information between tags and readers

30
Q

Near field communication (NFC)

A

a set of wireless technologies that allow two devices to communicate with each other when they are within a few centimeters of each other.

31
Q

Initialization vector (IV)

A

used to prevent unauthorized decryption of the message by a suspicious or malicious actor.

32
Q

Man in the middle

A

attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.

33
Q

Man in the browser

A

The Man-in-the-Browser attack is similar to the Man-in-the-Middle attack,

except the interception is done at the application layer by exploiting browser vulnerabilities.

34
Q

locator (URL) redirection

A

is a vulnerability which allows an attacker to

** force users of your application to an untrusted external site. 
**

The attack is most often performed by delivering a link to the victim,

35
Q

Domain reputation

A

a measure that Internet Service Providers (ISPs) use to determine whether your emails can be trusted or not.

36
Q

-PowerShell

A

a tool for task automation and configuration management that combines a command line shell with a scripting language.

37
Q
  • Python
A

an interpreted, object-oriented, high-level programming language with dynamic semantics

38
Q
  • Bash
A

provides a way to interact with Unix-based operating systems. It allows users to execute commands, perform complex operations,

39
Q
  • Macros
A

** malicious software.** This type of malicious software is called macro-based malware and it exploits the automatic execution feature of macros to run harmful code without the user's knowledge

40
Q
  • Virtual Basic for Applications (VBA)
A

a programming language that allows users to extend Microsoft Office applications like Excel, PowerPoint, and Word