Threats and Vulnerabilities Flashcards
Virus
MalwareReplicates itself on a systemCannot spread by itself
Worms
Propagates on it’s ownNoes not need a host application to be transportedSelf Contained
Trojan Horse
Program disguised as another programMay be included as an attachment or as part of an installation program.
Logic Bomb
Malware inserted into a system which sets off an action when specific conditions are met.
Rootkits
Has ability to hid spyware blockers, anti-virus program and system utilities. Runs at root level or admin access.
Backdoors
Bypass normal authentication methods. Full access to every aspect of the device.
Ping-of-Death
ICMP packet that is larger than allowed >65500
Land Attack
Creates packet with the same source and destination address. Creates a loop.
Teardrop Attack
Attacker creates a large packetOverlaps offset bits - packets never able to be reassembled
SYN Flood
Attacker sends succession of SYN requests to a target with bogus return address.Not effective against modern networks”half open handshake”
Smurf/Fraggle Attack
“broadcast attack”Attacker sends out ping with address of someone else’s address as return and have it sent to the broadcast address. Smurf=ICMP PacketsFraggle=UDP packets
Session Hijacking
Type of man in the middle attack Takes control of an active TCP session by using sequence number guessing.
Repudiation Attacks
Cannot tell who wrote it or where it came from.
Xmas Scan Attack
Conducted with XmasPacket with every option set for the protocol is in use. Assumptions made by how the computer responds
Spear Phishing
Email/IM scam
Particular target
Inside information needed
Whaling
Spear phishing
Directed toward high profile figures in organization
Transitive Access
Service that invokes another service to satisfy an initial request. Result of poor choice of access control mechanism (uses authentication to make access decisions). Tries another way when one isn’t successful.
Buffer Overflow (what it is/safeguards)
More info than buffer can hold and then computer crashes.
Can create a DoS attack
Nop/Noop - Non-operational data
Safeguards: Input validations, patch/upgrade
XSS (what it is/safeguards)
Cross-Site Scripting
Add comments/code to web pages which allows code injection.
Could redirect valid data somewhere else
Safeguard: Input validation, tie cookies to IP addresses
SQL Injection (what it is/safeguards)
Code put in a database via web form
Allows an attacker to query data from database
DoS most common SQL
User ID = ‘ ‘ or 1=1
Safeguard: Input validation
Transient vs Persistent Cookies
Transient: for current browsing session
Persistent: store for an extended period of time
ActiveX (what it is/vulnerabilities/safeguards)
Microsoft mobile code that runs on the client
Authenticode:
Code signing mechanism, ID the publisher
Ensures hasn’t been tampered with before download
Vulnerabilities:
Controls saved to HDD
Execution depends on current user acct security level
Once accepted it is always accepted
Safeguards:
Patches
Do NOT allow to run by default
Java Applets (what it is/vulnerabilities/safeguards)
Stand alone mobile code downloaded from server to a client.
Runs from browser
Sandbox:
- Virtual machine architecture
- Limits access to system resources
- Digitally signed can run outside the sandbox
Vulnerabilities:
- May be malicious
- Errors may allow some to escape the sandbox
Safeguards:
- Latest browser version
- Patches
- Disable
- Limit browser plug-ins
Fail Soft
Shuts down any nonessential components
Black Box
Examines program from user perspective
Testers do not have access to internal code
White Box
Examines the internal logical structures line by line
Gray Box
Combines Black/White Box
Testers approach software as user and have access to the source code.
Develop tests to be run as user.
EAP 802.1X
Authentication framework
NOT specific authentication mechanism
Used over PPP and WLANs
See Domain 4 slides pg. 90
Protocol Analyzers (what they do/types of tools)
Hardware or software
Analyzes traffic and breaks it down for you
Tools: Wireshark, Snort, Kismet
Penetration Testing (what it is)
Attempt to break into your own network by finding weaknesses. Assess amount of business impact if it’s successful.
Need written approval before attempting
Vulnerability Scanning (what it is/what it does/tools that do it/scanners)
Software that compares system to database of known vulnerabilities.
Detects potential vulnerabilities.
Tools: Protocol analyzers, port scanners, network mappers, password crackers, vulnerability scanners.
Scanners: Nessus, SAINT, NMAP, Retina
OVAL (what it is/when it’s used)
Open Vulnerability and Assessment Language
Used in vulnerability scanning.
Network Mappers (what it is/tools that do it)
Used to create network maps
Tools: Nmap, Solar Winds, What’s Up Gold
Port Scanners (what it does/tools that do it)
Probes for all enabled TCP/UDP ports
Tools: SuperScan, NMAP, Nessus