Threat, attacks, and vulnerabilities Flashcards

1
Q

Smishing

A

Smishing is a cyber-attack that targets individuals through SMS (Short Message Service) or text messages.

In a smishing attack, cybercriminals send deceptive text messages to lure victims into sharing personal or financial information, clicking on malicious links, or downloading harmful software or applications. Just like email-based phishing attacks, these deceptive messages often appear to be from trusted sources, and they use social engineering tactics to create a sense of urgency, curiosity, or fear to manipulate the recipient into taking an undesired action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dumpster diving

A

where bad guys physically look through the recycle bin and trash cans of the office to look for sensitive information. This info could include passwords, usernames, court documents. Dumpster diving is a form of social engineering as it exploits the human factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pharming

A

is a cyber-attack where the bad guy compromises the DNS server (dns spoofing or cache poisoning) of the site the user wants to visit by resolving the web site to a different IP (malicious server), or their host file was manipulated. Sometimes, attackers may compromise a router by modifying its DNS to redirect the victim to a fictious site. Url redirection.The attacker may also modify the host file of the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tailgaiting

A

it’s a physical threat where a person gains unlawful access to secure areas by following someone. It’s a social engineering thing where it exploits kindness. Tailgating is a physical approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Should surfing

A

the practice of obtaining unauthorized information by directly observing or spying on someone as they are entering information. It’s a form of social engineering where the attacker does not have to rely on sophisticated techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Eliciting information

A

a social engineering technique where attackers gather information about the victim through these various means:

Pretexting – creating a fabricated scenario, for example, Hello, sir. My name is Wendy. And I’m from Microsoft Windows. This is an urgent check-up call for your computer, as we have found several problems with it. Obviously, they’re not calling from Microsoft Windows. And Wendy is not a representative of Microsoft. This is someone who is trying to either gain access to your computer to convince you there is something wrong with it and to pay them to fix it or to gain access to your computer so that it can then participate in a botnet.

Phishing – using deceptive emails, web sites to trick the user.

Impersonation

Baiting – offering free software – enticing.

Quid pro quo – offering something for something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

A whaling attack is a kind of phishing scam and CEO fraud that targets high profile executives with access to highly valuable information. In a whaling attack, hackers use social engineering to trick users into divulging bank account data, employee personnel details, customer information or credit card numbers, or even to make wire transfers to someone they believe is the CEO or CFO of the company. Whale phishing is generally more difficult to detect than standard phishing attacks, as these attacks often do not use malicious URLs or weaponized attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prepending

A

Prepending is adding something to an exchange that furthers a threat actors goals. An example would be adding ‘URGENT’ or ‘RESPONSE REQUIRED’ to the subject of an email message (in which I want the victim to select a button to initiate some action). In these examples I’m trying top create a sense of urgency so my victim won’t fully think through their response and just do what I want them to do (press the button).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

reconnaissance

A

Active reconnsaissance

Actively gathering information or probing, where the tester is actively interacts with the system to gather information. This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat etc

Passive reconnaissance

This is when testers gather information about a system without actively interacting with the system. It does not require direct communication with the target. They collect information from publicly available sources like web sites and public databases. Some of the most common tools used in passive reconnaissance include social engineering, whois records, and search engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

The most common examples of phishing emails are:
The fake invoice scam.
Email account upgrade scam.
Advance-fee scam.
Google Docs scam.
PayPal Scam.
Message from HR scam.
Dropbox scam.
The council tax scam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

watering hole attack

A

a cyberattack targeting a particular organization, in which malware is installed on a website or websites regularly visited by the organization’s members in order to infect computers used within the organization itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some of the techniques that the threat actors use for watering hole attacks?

A

What techniques do hackers use in watering hole attacks?
Cross-site scripting (XSS): With this injection attack, a hacker can insert malicious scripts into a site’s content to redirect users to malicious websites.

SQL Injection: Hackers can use SQL injection attacks to steal data.

DNS cache poisoning: Also known as DNS spoofing, hackers use this manipulation technique to send targets to malicious pages.

Drive-by downloads: Targets at a watering hole may download malicious content without their knowledge, consent, or action in a drive-by download.

Malvertising: Known as malvertising, hackers inject malicious code in advertisements at a watering hole to spread malware to their prey.

Zero-day exploitation: Threat actors can exploit zero-day vulnerabilies in a website or browser that watering hole attackers can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Typosquatting

A

attackers registering domain names that are like the legitimate ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Influence campaigns

A

A phishing technique. A coordinated effort by different communication channels with the aim of shaping the perception and opinion, spreading propaganda or misinforming the target audience. These campaigns are from political groups or nation states. These acts can even be conducted in person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid warfare

A

using military tactics, cyber tactics with non-traditional and unconventional means to influence operations. It operates in multiple domains such land, air, sea, and cyberspace. It uses propaganda and disinformation while executing the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

black box testing

A

no knowledge of the system, this is an unauthorized hacker.

17
Q

white box testing

A

the tester has full knowledge

18
Q

gray box testing

A

combined both elements of white box testing and black box testing. The tester has partial knowledge.