Threats and Vulnerabilities Flashcards
Virus
MalwareReplicates itself on a systemCannot spread by itself
Worms
Propagates on it’s ownNoes not need a host application to be transportedSelf Contained
Trojan Horse
Program disguised as another programMay be included as an attachment or as part of an installation program.
Logic Bomb
Malware inserted into a system which sets off an action when specific conditions are met.
Rootkits
Has ability to hid spyware blockers, anti-virus program and system utilities. Runs at root level or admin access.
Backdoors
Bypass normal authentication methods. Full access to every aspect of the device.
Ping-of-Death
ICMP packet that is larger than allowed >65500
Land Attack
Creates packet with the same source and destination address. Creates a loop.
Teardrop Attack
Attacker creates a large packetOverlaps offset bits - packets never able to be reassembled
SYN Flood
Attacker sends succession of SYN requests to a target with bogus return address.Not effective against modern networks”half open handshake”
Smurf/Fraggle Attack
“broadcast attack”Attacker sends out ping with address of someone else’s address as return and have it sent to the broadcast address. Smurf=ICMP PacketsFraggle=UDP packets
Session Hijacking
Type of man in the middle attack Takes control of an active TCP session by using sequence number guessing.
Repudiation Attacks
Cannot tell who wrote it or where it came from.
Xmas Scan Attack
Conducted with XmasPacket with every option set for the protocol is in use. Assumptions made by how the computer responds
Spear Phishing
Email/IM scam
Particular target
Inside information needed