Threats and Vulnerabilities Flashcards
CIA triad
Confidentiality / integrity / availability
Confidentiality
Encryption
WPA2 WEP
Integrity
Hashing
Hash MD5 SHA1 SHA256
Availability
Redundancy reliability
CVE
Common vulnerabilities and exposures
Known vulnerabilities
Zero day
Unknown vulnerabilities
5 vulnerability types
Non-compliant systems
Unpatched
Unprotected
EOL-OS
BYOD
3 DOS types
Flood attack - ping flood / SYN flood
Permanent DOS - forceful reflashing
Fork bomb - fills up a processor
DDOS type uses zombies or bots
DNS amplification - flood a website with DNS requests
3 Spoofing types (faking identity)
Ip spoofing - faking ip address (layer 3)
Mac spoofing - (layer 2)
ARP spoofing - arp request to pair ip+mac
4 on path attacks
(When a attacker puts themselves in the middle)
ARP poisoning
DNS poisoning
Rouge WAP
Rouge Switch
SSL stripping
Turns HTTPS into HTTP
Downgrade attack
Lowers the encryption version
SQL injection
Structured Query Language
Insert SQL info into input data on a web application
Example replace password with ‘or 1=1
XSS
Cross site scripting
Embeds script into website to effect the USER
XSRF
Cross Site Request Forgery
Forces authenticated user to effect the SERVER
4 Password Cracker types
Password guessing
Dictionary attack
Brute force attack
Cryptanalysis attack (compared hashes to a lookup table called a rainbow table)
- Symptoms of infection with malware
Hard drive, files, or apps aren’t accessible
Strange noises
Unusual error messages
Display looks strange
Jumbled printouts
Double file extensions
New files or missing files
System restore won’t function
Sign of infection and how to counter
Computer is acting funny or strange
Boot into safe mode
Or boot from external and scan with antivirus
Phishing
Social engineering attack from supposedly reputable source trying to get victim to divulge information
Spear phishing
Targeted small group phishing
Whaling
Phishing fixed on executives
Smishing
Sms phishing (texting)
Vishing
Voice phishing
BEC
Business email compromise
Taking over a executives email
Pharming
Tricks user into imputing info by redirecting to a website controlled by attacker
Elicitation
Ask people questing to get information or do something
Pretexing
Giving some kind of know or assumed info to get someone to share more
Social engineering
Hacking people
Tailgating
Following an authorized person into a secure area
Piggybacking
Tailgating with employees knowledge or consent
Shoulder surfing
Looking over someone’s shoulder
Evil twin
A fraudulent WAP
Karma attack
Finds devices looking for WAPs they’ve previously connected to and matches the SSID they’re looking for
Captive portal
Web page you’re obligated to visit prior to access being granted