Threats, Attacks, and Vulnerabilities Flashcards
Passive Information Gathering vs. Active Information Gathering
Passive Information Gathering
* where you gather open-source or publicly available information without the organization being aware that the information has been accessed
Active Information Gathering
* probe the organization using DNS Enumeration, Port Scanning, and OS Fingerprinting techniques
Vishing
Phising conducted over voice and phone calls
Phishing
An attempt to fraudulently obtain information from a user
Spear Phishing
Like phishing but usually targeting a specific indivdual/group
Whaling
Form of spear phishing that targets any high-value target in an organization
Like CEO, CFO, CIO, CSO etc.
Pharming
Phishing attempt to trick a user to access a different or fake website
Smishing/Spimming
Phishing conducted of text messaging (SMS)
What kind of attack is an example of IP spoofing?
On-path attack
On-path attacks intercept communications between two systems
What ports would web-based attacks likely appear on?
Port 80 (HTTP) and port 443 (HTTPS)
Zero-day attack
Attack against a vulnerability that is unknown to the original developer or manufacturer
When you see ‘dot-dot-slash (../)’ sequence, it is most likely a…
Directory Traversal Attack
aims to access files and directories stored outside webroot folder
Spoofing
the act of disguising a communication from an unknown source as being known, trusted source
Smurf Attack
Uses a single ping with a spoofed source address sent to the broadcast address of a network
What team monitors and manages defenders’ and attackers’ technical environment during a cybersecurity training excercise?
White team
judge, enforce rules, observes, scores and resolves any problems
Zombie
a computer connected to the internet that has been compromised by as hacker, computer virus, or trojan horse program adn can be used to perform malicious attacks of one sort or another under remote direction
SYN Flood
A variant of DoS where the attacker initiates multiple TCP sessions but never completes the 3-way handshake
Privilege Escalation
Occurs when a user is able to gain the rights of another user or adminstrator
Vertical Privilege Escalation and Horizontal Privilege Escalation
SQL Injections
SQL injections target data stored in enterprise databases by exploiting flaws in client-facing applications, most commonly web applications
What is a way to identify rogue devices on a wired network?
Router and switch-based MAC address reporting
MAC Address
A hardware identifier that uniquely identifies each device on a network
A computer is infected with malware that has infected the Windwos kernal to hide. What type of malware is this?
Rootkit
Rootkit
Software designed to gain administrative level control over a system without detection
Threat Vectors
- Direct Access
- Wireless
- Supply Chain
- Social Media
Bluetooth Attacks
Bluejacking (sending) and Bluesnarfing (taking)
Race Condition
occur when the outcome from execution process is directly dependent on the order and timing of certain events
those events fail to execute in the order and timing inteded by the developer