Session 06: Cyber Attacks Flashcards
What are the types of cyber attacks?
- DNS Tunneling
- DoS and DDoS
- Man in the middle
- Phishing
- Ransomware
- SQL Injection
- XSS
- Malware
- Session Hijacking
Famous cyber attacks
- Russian/Ukraine conflict
- Apache Log4j Vulnerability
- SolarWinds Sunburst attack
- Kaseya Ransomware attack
- Amazon DDoS attack
- Microsoft Exchange Remote Code Execution Attack
- Twitter Celebrities Attack
DNS Tunneling
Hackers implant harmful code or software within what seems like a DNS request
DoS and DDoS
Denial of Service / Distributed Denial of Service
Overwhelm a system’s resources until it can no longer respond to legitimate service requests.
Man-in-the-middle
Allow an attacker to intercept data exchange between two people, network or computers.
Phishing
Sends an email that appears to come from a trusted and legitimate source in a attempt to obtain sensitive information from a target.
Ransomware
Victim’s system or data is held hostage until the victim agrees to pay the attacker a ransom.
SQL Injection
Use SQL queries sent from the client to a database on the server. Commands are inserted or injected into the data plane.
XSS
Cros Site Scription
Send malicious scripts with clickable content to the target browser. Once the victim clicks on the content, the script will be executed.
Malware
Enters network through vulnerabilities when users click on unsafe links or email attachments to install unsafe software.
Session Hijacking
One of many types of MITM attacks. Attacker hijacks the session between the client and server.