Threats & Vulnerabilities Flashcards

1
Q

Denial of service

A

• Force a service to fail - Overload the service

  • Take advantage of a design failure or vulnerability
  • Keep your systems patched!
  • Cause a system to be unavailable
  • Competitive advantage
  • Create a smokescreen for some other exploit
  • Precursor to a DNS spoofing attack

• Doesn’t have to be complicated - Turn off the powe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A “friendly” DoS

A
  • Unintentional DoSing
  • It’s not always a ne’er-do-well

• Network DoS - Layer 2 loop without STP

• Bandwidth DoS
• Downloading multi-gigabyte
Linux distributions over a DSL line

• The water line breaks - Get a good shop vacuum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed Denial of Service (DDoS)

A

• Launch an army of computers to bring down a
service
• Use all the bandwidth or resources - traffic spike

• This is why the bad guys have botnets
• Thousands or millions of computers at your
command
• At its peak, Zeus botnet infected over 3.6 million PCs
• Coordinated attack

• The attackers are zombies
• Many people have no idea they are
participating in a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero-day attacks

A
  • Zero-day
  • The vulnerability has not been detected or published
  • Zero-day exploits are increasingly common
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Man-in-the-Middle

A

• How can a bad guy watch
without you knowing?
• Man-in-the-middle

  • Redirects your traffic
  • Then passes it on to the destination
  • You never know your traffic was redirected

• ARP poisoning - ARP has no security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mitigating man-in-the-middle

A
  • Use encrypted protocols
  • HTTPS, SSH
  • Communicate over a secure channel
  • Client-based VPN
  • Use encrypted wireless networks
  • Avoid insecure networks
  • Public WiFi, Hotels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute Force Attacks

A
  • The password is the key
  • Secret phrase
  • Stored hash
• Brute force attacks - Online
 • Keep trying the login process
 • Very slow
 • Most accounts will lockout after a
    number of failed attempts
• Brute force the hash - Offline
 • Obtain the list of users and hashes
 • Calculate a password hash,
    compare it to a stored hash
 • Large computational resource requirement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dictionary attacks

A
  • People use common words as passwords
  • You can find them in the dictionary

• If you’re using brute force, you should start with the
easy ones
• 123456, password, ninja, football

  • Many common wordlists available on the ‘net
  • Some are customized by language or line of work

• This will catch the low-hanging fruit
• You’ll need some smarter attacks for the smarter
people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rainbow tables

A
  • An optimized, pre-built set of hashes
  • Doesn’t need to contain every hash
  • The calculations have already been done
  • Remarkable speed increase
  • Especially with longer password lengths
  • Need different tables for different hashing methods
  • Windows is different than MySQL
  • Rainbow tables won’t work with salted hashes
  • Additional random value added to the original hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spoofing

A
  • Pretend to be something you aren’t
  • Fake web server, fake DNS server, etc.

• Email address spoofing
• The sending address of an email isn’t really the
sender

  • Caller ID spoofing
  • The incoming call information is completely fake

• Man-in-the-middle attacks
• The person in the middle of the conversation
pretends to be both endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC spoofing

A
  • Your Ethernet device has a MAC address
  • A unique burned-in address
  • Most drivers allow you to change this

• Changing the MAC address can be legitimate
• Internet provider expects a certain MAC address
• Certain applications require a particular MAC
address

  • It might not be legitimate
  • Circumvent MAC-based ACLs
  • Fake-out a wireless address filter
  • Very difficult to detect
  • How do you know it’s not the original device?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of general term is used to describe the process of securing a computer system?

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refers to the contents of a rainbow table entry?

A

Hash/Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Removing Malware

A
  1. Identify malware symptoms
  2. Quarantine infected systems
  3. Disable System Restore
    4a. Remediate: Update anti-virus
    4b. Remediate: Scan and remove
  4. Schedule scans and run updates
  5. Enable System Protection
  6. Educate the end use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly