Threats, Attack and Vulnerabilities Flashcards
Virus
Replicates, requires user action
Trojan
Hidden as something else
Worm
Self-replicating
Logic bomb
Virus with specific activation logic
Polymorphic virus
avoid signature-based detection by self-mutation
Armored virus
Decompilation-resistant
ARP poisoning is commonly used in
MITM
The ARP cache
maps IPs to MAC addresses
Replay attack
Sniffing and resubmission
Transitive Access Attack
Capture credentials through access of honeypot shared folder
Spoofing
Masquerade as a trusted system
DNS Poisoning
redirects to malicious server, either local or through DNS provider
Smurfing
ICMP Flood with a spoofed header
Sniffer attack
Used for recon, based on network examination
XMAS scan
Each packet has 3/6 flags to hide the scan
Hybrid password attack
Bruteforce and dictionary
Birthday attack
Bruteforce hash collision
Pharming attack
Malicious site through DNS Poisoning
Spearfishing
Directed phishing from a fake trusted person
Vishing
Telephone Phishing
Whaling
Phishing for high-level targets
War chalking
War driving, sniffing unprotected networks en masse
Rogue access point
Fake access point
Evil twin
A rogue WAP with similar SSID
Session hijacking
Disconnects session (DoS) and impersonates the user
Static environment
Hardware that is out of direct control, as processors.
Bluesnarfing
Bluetooth hijack for information retrieval
Bluebugging
Using bluesnarfing for installing a backdoor
MAC Flooding
Overloads CAM on switch leading to traffic being sent on all ports
Vishing
Voice phishing with spoofed caller ID
Authority Principle
Using an authority figure to pressure in SE attack
Threat to act belligerently on an SE attack
Intimidation principle
Using an authority figure to pressure in SE attack
Authority Principle
Be personable or create a bond for SE attack
Familiarity Principle
Citing professional credentials or organizational status for SE attack
Trust Principle
Make a social connection claiming someone else can vouch for them in an SE attack
Social Proof Principle
Claiming something is urgent in an SE attack
Urgency Principle
Claiming you don’t have time for verifying your identity in an SE attack
Scarcity Principle
Companion virus
Disguised as a legitimate program but with different extension
File Infector Viruses
They infect files .com or .exe
Macro Viruses
Excel and word macros, VBA
Stealth Viruses
Hijack system calls to not reveal corrupted files
Metamorphic Virus
Polymorphic but also changes memory payload
Pass the hash
Authenticate using hashing credentials that had been intercepted