types of attacks Flashcards
Social Engineering
Social engineering involves a hacker attempting to trick an employee into compromising security through social contract such as an email.
Impersonation
A social engineering attack in which a hacker attempts to impersonate another employee in the organisation. For example, when a hacker impersonates a network administrator.
Phishing
A social engineering attack in which a hacker typically sends e-meails to users pretending to be a representative form legitimate companies (Banks, Amazon). The email includes falsified information in an attempt to lure the user to click a link redirecting them to a false website in order to obtain/steal personal information
Whaling and Vishing
Two types of phishing attacks. Whaling is a targeted phishing attack aimed at executive level employees. Vishing utilises phone calls as opposed to e-mails.
Smishing
A type of phishing attack which the hacker sends text messages to victims, often impersonating official companies to steal sensitive information
spIM
‘Spam over instant messaging’ is a type of social engineering attack in which bots are utilised to send users instant messages in an attempt to steal user data
Spear Fishing
A type of phishing attack in which an email sent is spoofed and looks like it comes form a trusted source such as a fellow employee.
SPAM
A type of social engineering attack in which unsolicited emails are sent to a number of people.
Eliciting information
A social engineering technique to obtain information from a user that could be used in a future attack.
Prepending
A social engineering technique in which information is added to the beginning of malicious data. For the attacker may get you
to click a link that is www.banksite.com@192.168.2.1, where the
browser would ignore everything to the left of the @ sign.
Invoice Scams
is a type of social engineering attack in which an attacker sends out an email message notifying the victim that payment is overdue and immediate payment is required.
Credential Harvesting
A type of social engineering attack in which hacker collects logon information and then uses that information later to access accounts
Influence campaigns
Social engineering attack which utilises social media to create fake accounts as well as fake posts that are designed to sway opinion
Shoulder Surfing
A type of social engineering attack in which a hacker tries to view confidential information that will assist in compromising security by looking over the shoulder of victims to see computer screens
Tailgating
A type of social engineering attack in which a hacker walks through a secure area by closely following an authorised person who has unlocked the door using their swipe card or passcode. (someone tries to slip through doors behind you after you unlock it)
Physical Attacks
Involve getting physical access to a system or device and gaining access to the device or performing malicious actions against it
Malicious USB cable
A type of physical attack that utilises a malicious cable to connect to the system that can then receive commands form the hacker wirelessly
Malicious flash drive
A physical attack which uses a malicious USB drive that contains malware that executes on the victim system once the flash drive is connected to the USB port of the system
Card cloning
A physical attack that a hacker copies the card information of a magnetic strip
Skimming
A physical attack in which a hacker extracts information from the magnetic strip on the card when you swipe you card
Principles of Social Engineering
Authority, Intimidation, Consensus, Scarcity, Urgency, Familiarity, Trust
DoS
Denial of Service is a network attack that involves a hacker overloading a system with requests so much that it is too busy and cannot service legitimate requests from other clients.
DDoS
Distributed Denial of Service is a network attack that uses a number of systems to perform a larger scale DoS attack. With a DDoS attack, the hacker first compromises
and takes control of a number of systems and then uses those systems to
help with the attack. The compromised systems are known as zombie
systems because they have no mind of their own and will do whatever the
hacker tells them to do.
Different Types of DDoS attacks
Network:
involves using up network
bandwidth or consuming the processing power of network devices so that the network becomes unresponsive or performs poorly
Application:
involves flooding a specific software application or service with requests to cause it to crash or become unresponsive
Operational technology:
DDoS attack against hardware or software that is required to run
industrial equipment
Spoofing
A type of network attack where the hackers alters the source address of information to make it look like it is coming from a different person. Spoofing is sometimes referred to as refactoring
IP Spoofing
When the source IP address of a packet is altered so that it appears as if the packet comes from a different source
MAC Spoofing
When the source MAC address of a frame is altered so that it appears to have come from a different system or device
Email Spoofing
When the ‘form’ address of an email message has been altered so that the email looks like to comes from someone else.
Eavesdropping/Sniffing
A type of network attack that the hacker captures network traffic and is able to view the contents of the packets traveling along the network
Replay
A network attack that starts as a sniffing attack in order to capture traffic. Then the hacker resubmits the traffic onto the network later. The hacker may alter the traffic
first and then replay it, or the hacker may simply be replaying traffic to generate more traffic.
On-Path Attack (MitM attack)
A type of network attack in which a hacker inserts himself in the middle of tow systems that are communicating. The hacker can then pass information between the two.
MITB attack
Man-in-the-browser attack is a network attack, where the browser contains a Trojan that was inserted via an add-in being loaded or a script executing within the browser. The Trojan at this point can intercept any data the user inputs into the browser and alter it before sending it to the destination server. Example is Zeus and SpyEye
Layer 2 attacks
Layer-2 networking attacks affect layer-2 networking devices, such as switches, or layer-2 components
and protocols, such as MAC addresses and ARP
ARP Poisening
Layer 2 attack that involves the hacker altering the ARP cache on a system, or group of systems, so that all systems have the wrong MAC address stored in the ARP cache for a specific IP address—maybe the address of the default gateway. Typically, the hacker will poison the ARP cache so that the default gateway IP address (your router’s IP address) points to the hacker’s MAC address. This will ensure that every time a system tries to send data to the router, it will retrieve the hacker’s MAC address from the local ARP cache and then send the data to the hacker’s system instead of to the router
MAC Flooding
Layer 2 attack that n the attacker sends a large number of frames to the switch, causing it to fill the MAC address table and, as a
result, remove old, valid MAC addresses but add the new fake MAC addresses
MAC cloning
Layer 2 attack in which the attacker copies the MAC address of another system and uses it for network communication. This could be used to bypass access control lists, where only traffic from specific MAC addresses is allowed on the network