Threats and Vulnerabilities Flashcards
What is DOS Attack?
- Denial Service of Attack
- A machine floods a victim with requests
- TCP SYN Flood (Multiple TCP sessions)
- Smurf Attack (ICMP Flood)
- DDOS (Multiple computer flood similar to BotNet and Zombie)
What is MITM Attack?
- Man In The Middle (On-Path Attack)
- Attacker in between victim and destination
What is Session Hijacking?
An attacker guesses the session ID that is in use between a
client and a server
What is DNS Poisioning?
Involves corrupting the DNS cache to redirect users to malicious websites, making it a potent technique for intercepting web traffic and stealing sensitive information.
What is Rogue DHCP Server?
A DHCP server on a network which is not under the administrative control of the network administrators
What is Spoofing?
An attacker masquerades as another person by falsifying their identity
What is IP Spoofing?
Modifying the source address of an IP packet to hide the identity of the sender or impersonate another client
What is MAC Spoofing?
- A technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.
- Affect every computer on this network subnet.
What is MAC Filtering?
Relies on a list of all known and authorized MAC addresses
What is ARP Spoofing?
- A type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network.
- Results in the linking of an attacker’s MAC address with the IP address of a legitimate computer, server, or gateway on the network.
- Targets single host’s traffic
What is VLAN Hopping?
Attacker exploits misconfigurations to gain unauthorized access to different VLAN
What is Double Tagging?
- Attacker exploits trunk port vulnerabilities to direct traffic to another VLAN
- VLAN Hopping Attack
What is Switch Spoofing?
An attacker modifying a device’s MAC address to appear as an authorized switch port
What is Malware?
Designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent
What is Virus?
Made up of malicious code that is run on a machine without the user’s knowledge and infects it whenever that code is run
What is Worm?
A piece of malicious software that can replicate itself without user
interaction
What is Trojan Horse?
A piece of malicious software disguised as a piece of harmless or
desirable software
What is RAT?
- Remote Access Trojan
- Provides the attacker with remote control of a victim machine
What is Ransomware?
Restricts access to a victim’s computer system or files until a ransom or payment is received
What is Spyware?
Gathers information about you without your consent
What is Keylogger?
Captures any key strokes made on the victim machine
What is Rootkit?
Designed to gain administrative control over a computer system or network device without being detected
What is Rogue Access Point?
A wireless access point that has been installed on a secure network without authorization from a local network administrator
What is Shadow IT?
Use of IT systems, devices, software, applications, or services without the explicit approval of the IT department
What is Evil Twin?
Wireless access point that uses the same name as your own network
What is Deauthentication?
Attempts to interrupt communication between an end user and the wireless access point
What is Dictionary Attack?
Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary
What is Brute Force Attack?
Tries every possible combination until they figure out the password
What is Hybrid Attack?
Combination of dictionary and brute force attacks
What is Wireless Interception?
Captures wireless data packets as they go across the airwaves
What is Insider Threat?
An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company`
What is Dumper Diving?
Scavenging for personal or confidential information in garbage or
recycling containers
What is Shoulder Surfing?
Coming up behind an employee and trying to use direct observation to obtain information
What is Piggybacking?
Similar to tailgating, but occurs with the employee’s knowledge or
consent
What is Tailgaiting?
Entering a secure portion of the organization’s building by following an authorized person into the area without their knowledge or consent
What is Whaling Attack?
Focused on key executives within an organization or other key leaders, executives, and managers in the company
What is Phishing?
Sending an email in an attempt to trick a user to click a link and divulge personal information such as credit card and bank account information.
What is Social Engineering?
Is a hacker term for tricking people into revealing their password or some form of security information.
What is Spearphishing?
More targeted form of phishing
What is Logic Bomb?
A specific type of malware that is tied to either a logical event or a specific time
What is On-Path Attack?
- An attack where the penetration tester places their workstation between two hosts to capture, monitor, and relay communications.
- Known as MITM Attack
What is ARP Poisoning?
- Corrupts ARP cache by associating attacker’s MAC with IP addresses of LAN devices
- Affects all hosts in a LAN
What is Deauthentication Attack?
- Attacker captures packets used in association/authentication processes to crack shared passphrase
- Wireless
What is a Frequency Jamming?
Denying wireless service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.
What is Exploit?
A malicious technique or software crafted to exploit vulnerabilities in computer systems, often leading to unauthorized access or system compromise?
What is QoS?
- Quality of Service
- A set of technologies that help a network perform well by controlling traffic and prioritizing applications
What is MAC Flooding?
- An attack that targets switches on LAN.
- Involves sending multiple packets with fake MAC addresses to overflow switch address table.
What is Bluejacketing?
A cyberattack that involves sending unwanted messages to a Bluetooth-enabled device using Bluetooth.