Threats & Vulnerabilities Flashcards
What is adware?
i.e Malicious software popup prompting to buy something
What is a virus?
Attaches itself as malicious payload to another program, spreads via a host file
What is spyware?
Retrieving sensitive information
What is a trojan?
Malicious software disguised as something else, does not replicate
What is a rootkit?
Program hides using bootstrap loader system/kernel level access
What is a logic bomb?
Malicious code that triggers based on certain conditions being met
What is ransomware?
Denying access to computer for extortion
What is polymorphic malware?
Malware that changes it’s behavior to evade AV signature definition detection, code remains the same i.e encryption
What is an armored virus?
Virus specifically designed to prevent its source code being analysed, trick AV program space it is running is somewhere else
What is a smurf attack?
Ping request to broadcast address to cause all client to respond, combines with source address spoofing for DoS
What is a replay attack?
Replaying data i.e log in sequence
What can be used to mitigate replay attacks?
Session token that expires
Anti replay counter
What is spoofing?
Impersonation of another entity
What is SPAM vs SPIM?
SPAM is unwanted email
SPIM is unwanted messages on instant messaging
What is a XMAS attack?
Port scanning + discovering underlying OS
What is pharming?
DNS poisoning
change lmhost file, dns cache resolution, dns sever
How would MITM be achieved with ARP poisoning?
Spoof MAC address of another computer
Change victim computer default gateway to relay through rogue computer
What is XSS?
Cross-Site Scripting
What is transitive access?
Access gained indirectly
i.e jump host
What is a worm?
Malicious software that replicated between systems without a host file
What is a rainbow table?
List of common password hashes
What is a birthday attack?
Using hash collisions to gain access despite data being different
What is typo squatting?
Misleading by wrong url
i.e googlee.com
What is a watering hole attack?
Compromising known website to infect computer
What is reciprocity?
Complying with someone because they did something beneficial to you
What is consensus?
Following what everyone else is doing
How to you protect against a cross-site scripting attack?
Input & output validation on server side
Input client to server
Output server responding to client
What is an attack vector for cross-site scripting?
Customized link with an embedded script
What is a way to protect against SQL injection?
Turn off SQL commands and used stored procedures
What is directory traversal/command injection?
Navigating through file system to execute something
What is banner grabbing?
Scanning port activity during vulnerability scan for additional information
What is black box penetration testing?
No prior knowledge of target infrastructure
What is white box penetration testing?
Full knowledge of infrastructure before testing
What is gray box penetration testing?
Some knowledge of infrastructure before testing
What is XSRF?
Cross-site Request Forgery
What advantages does NoSQL have against SQL?
Not subject to SQL injection
Highly scalable
What is fuzzing?
Entering random data on software in attempt to break it with an exception that cannot handle the error (trial and error)
What is blue snarfing?
Theft of information from Bluetooth device
What is blue jacking?
Pushing information to a Bluetooth device
What is metamorphic malware?
Malware changes itself each iteration retaining the same functionality