Types of Attacks Flashcards
What is an online attack?
They are trying to attack your creds directly onto the system. Repeatedly trying your account.
What is an offline attack?
Attacks involve compromising a service/account later on.
hacker get a download a database. on their own system to attempt later to login on an online server.
What is a dictionary attack?
using a list of words or previously compromised passwords
what is a brute force attack?
trying every possible combination of password with a single account.
What is password spraying?
trying a single password against all possible accounts.
What are rainbow tables?
precomputing plaintext/hash pairs to form a lookup table that is used.
What is pass the hash?
Attacker grabs the actual hash that is being used and uses that instead of wasting time cracking the plain text password.
This was an issue with LM and NTLM in Windows.
What is input validation?
Is a process of checking that the data that is being inputted is correct.
and if not, you cannot submit the info. Prevents the injection of malicious instructions
Example: when you are trying to submit a form and it tells you to fix a certain field before proceeding.
What is input Sanitization?
Is where you can fix the users mistakes. You are cleaning up their input.
Example. If a user puts a - or a space, you can clean up all those characters.
What is a buffer overflow?
A vulnerability in software coding that can be exploited by hackers to gain access to systems.
The data exceeds data space and it overflows into the important processes..
What is memory buffer?
Is just a holding spot for data to be hold as it is transferred between location.
What is a pointer/Object Dereferencing?
Refers to a memory address associated with some data. They “point to the data”
so the pointer references a specific data location in memory.
The hacker could point to a different data.
What is a memory leak and Resource exhaustion.
When application don’t surrender memory space after they are done using it. The application memory consumption balloons over time.
It can cause resource exhaustion and therefor denial of service.
What is a Structured Query Language (SQL) injection and what can attackers to do with it?
A code injection attack to attack data driven application. They insert input statements into fields for malicious purposes. Typically attacks against websites where inputs are needed.
1=1
Bypass security mechanisms (confidentiality)
Tamper with data ( integrity)
Cause downtime (availability)
How do you stop a SQL injection attack?
Input validation. Make sure to sanitize the info.