Security + NET ATTACKS Flashcards
network attacks
bluejacking
**involves sending unsolicited messages **to Bluetooth-enabled devices, such as laptops, mobile phones, or PDAs
bluesnarfing
the unauthorized access of information from a wireless device through a Bluetooth connection,
Vishing
cyberattack that uses the phone to trick people into sharing sensitive information.
(SPIM) Spam Over Instant Messaging
Spam that is sent through instant messaging, SMS, or private messages on websites.
(intrusive ads, spyware, or viruses)
Smishing
phishing scam that uses text messages to trick people into sharing personal or financial information
Cryptographic attack
a malicious attempt to exploit a weakness in a cryptographic system and gain unauthorized access to sensitive information
Downgrade attack
take advantage of a system’s backward compatibility to force it into less secure modes of operation.
Deauthentication attack
type of denial-of-service (DoS) attack that disrupts the connection between a wireless device and its Wi-Fi access point
Denial-of-Service
attack that aims to disrupt, disable, or shut down a network, website, or service
Brute-force attack
a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
Spoofing
` involves disguising information to trick people into believing they are interacting with a trusted source`
Replay attacks
eavesdropping on network traffic, capturing legitimate communication packets, and then replaying them to the target devic
Eavesdropping
used by cyberattackers to intercept communication and steal sensitive data in transit
Data interception
a type of data theft that involves the unauthorized redirection of information intended for one party to another
on-path attack
cyberattack where a malicious actor secretly positions themselves between two devices to intercept or modify communications between them
ARP poisoning
cyber attack carried out over a Local Area Network (LAN) that
- i
nvolves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table
DNS poisoning (Domain Name System )
happens when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website
Media Access Control (MAC) flooding
is a network attack that compromises the security of a network **SWITCH** by overflowing its memory used to store the MAC address table.
MAC spoofing
a technique for **changing **a factory-assigned Media Access Control (MAC) address
of a network interface on a networked device
MAC cloning
changing or impersonating the MAC address of a network interface card to match the MAC address of an authorized device on the network.
Domain hijacking
refers to a situation in which domain registrants due to unlawful actions of third parties lose control over their domain names.
URL hijacking
attackers* take advantage of common typos or misspellings* that users make when typing in the URL of a legitimate site.
Pharming
cyberattack that redirects a user’s browser to a fake website without their knowledge or consent
Typosquatting
** involves registering a domain name** that is similar to a legitimate website's but with an intentional typo
Directory traversal attacks
a **vulnerability **in a web application server caused by a HTTP exploit.
The exploit allows an attacker to access restricted directories, execute commands,
For example, if a website downloads a PDF to a user’s computer using the URL https://www.vulnerable.com/download_file.php?file=document.pdf, the attacker can pass in the file name ../../etc/passwd.
OT DDoS attack
designed to exploit the systems that are directly on the plant floor.
Rogue access point
**a wireless access point **that is installed on a network without the network owner's permission
Disassociation (WiFi)
a normal part of the communication protocol, used to cleanly break the connection between a device and the network.
Jamming (WiFi)
create traffic jams for the radio transmitter so that real traffic cannot get through,
Radio frequency identifier (RFID) _ WiFi
a wireless technology that uses radio waves to communicate information between tags and readers
Near field communication (NFC)
a set of wireless technologies that allow two devices to communicate with each other when they are within a few centimeters of each other.
Initialization vector (IV)
used to prevent unauthorized decryption of the message by a suspicious or malicious actor.
Man in the middle
attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
Man in the browser
The Man-in-the-Browser attack is similar to the Man-in-the-Middle attack,
except the interception is done at the application layer by exploiting browser vulnerabilities.
locator (URL) redirection
is a vulnerability
which allows an attacker to
** force users of your application to an untrusted external site. **
The attack is most often performed by delivering a link to the victim,
Domain reputation
a measure that Internet Service Providers (ISPs) use to determine whether your emails can be trusted or not
.
-PowerShell
a tool for task automation and configuration management that combines a command line shell with a scripting language.
- Python
an interpreted, object-oriented, high-level programming language with dynamic semantics
- Bash
provides a way to interact with Unix-based operating systems. It allows users to execute commands, perform complex operations,
- Macros
** malicious software.** This type of malicious software is called macro-based malware and it exploits the automatic execution feature of macros to run harmful code without the user's knowledge
- Virtual Basic for Applications (VBA)
a programming language that allows users to extend Microsoft Office applications like Excel, PowerPoint, and Word