Types of Attacks - Technical Flashcards

1
Q

Attacker exploits know vulnerabilities in specific app or OS or attack features in specific protocols or services in an attempt to deny authorized users access to an info system or features of that Info system.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A DoS carried out using multiple attack system.

A

Distributed Denial of Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS type of attacks can be made up of compromised systems that are unwitting participants in an attack

A

Zombie Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Comprised of capturing traffic between two hosts. The attacker can observe traffic before relaying it. To the sending system it appears that all communication is occurring normally since all expected replies are received.

A

Man-in-the-Middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Input buffer used to hold input is overwritten with data that is larger than the buffer can handle and happens due to error-checking not present in the way the application is written, whether it be due to poor coding practices or limitations of the programming language used.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Input from users is not validated against expected results and allows attackers to obtain command-line access at the privileged level of the application.

A

Injections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Takes advantage of user input not being validated properly and is one of the most common web attacks. If the input is not validated properly, an attacker can include their script in their input and have it rendered as part of the web process.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

XSS TYPE

Injected script is not stored but immediately executed and passed back via the web server.

A

Non-persistent XSS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XSS TYPE

Script is permanently stored on the web server or on some back-end storage system and allows the attacker to continue log the script against those who log into the system.

A

Persistent XSS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XSS TYPE

Script is executed in the browser via the DOM process as opposed to on the web server

A

DOM-based XSS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

XSS ATTACK

Theft of authentication

A

Web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

XSS Attack

Session

A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XSS Attack

Deploy hostile

A

Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

XSS Attack

Change user

A

Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XSS Attack

Impersonate

A

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XSS Attack

Phishing or stealing

A

Sensitive Information

17
Q

Attacker utilizes authorized activity to be performed outside authorized use against sites that have authenticated users - exploits the trust in previous authentication request.

A

Cross-Site Request Forgery (XSRF)

18
Q

First step is to obtain root or admin level access and is called.

A

Privilege Escalation

19
Q

Create a DoS and sufficient enough volume of packets to overwhelm a host such as a large server - more than one device is needed.

A

Amplification.

20
Q

Attackers make unauthorized incorrect modifications to a DNS table of the host system.

A

DNS Poisoning

21
Q

Act of changing the registration of a domain name without the permission of its registrants and spreads false domain locations via the DNS system

A

Domain Hijacking

22
Q

Variant of MITM - installed piece of malware on a compromised system that “watches” user activity in their browser and when the user navigates to a certain site (such as a bank) the malware creates diff set of instructions - ie redirecting bill pay to transfer to attackers account

A

Man-in-the-Browser

23
Q

Attack that takes advantage of a vulnerability that a software vendor is not aware of.

A

Zero Day

24
Q

Attacker captures communication and replays it later to circumvent authentication mechanisms such as capturing and reusing certificates or tokens.

A

Replay attack

25
Q

Chances are if you authenticate with a username and password, your system doesn’t capture your password, rather it hashes it out, and that is what’s passed to your authentication mechanism. If an
attacker were to capture that hash and reinsert it into an authentication attempt, the system would verify
correctly, giving them access. This is known as a ”pass the hash” attack

A

Pass the hash

26
Q

The attacker tricks a user into clicking something different than what is displayed on the userinterface, using an overlay with invisible clicking elements that align with actual elements.

A

Clickjacking

27
Q

Refers to the process of taking control of an already existing session. The attacker doesn’t
have to circumvent any authentication mechanisms as the user has already authenticated

A

Session Hijacking

28
Q

Oftentimes, attacks need some type of user interaction. If an attacker can
get you to navigate to their site which houses their malicious payload, they’re winning the battle. One way to
accomplish this is with URL Hijacking, forcing users to navigate to a site they didn’t intend to. For
typosquatting, what happens is attackers set up their nefarious page with similar names to legitimate
businesses. For instance, they’ll replace letters that are commonly mistaken, such as an i for an l. Generally,
they’ll create their site to look similar to that of the one you intended to navigate to. This is done so that they
can capture your authentication information.

A

URL Hijacking and Typosquatting

29
Q

An attack on a system by changing their drivers, thus changing the behaviors of the
system. Drivers are generally less secure than the operating system that they’re connected to, leaving a
security gap that can be exploited.

A

Driver Manipulation

30
Q

This is the act of putting code between the OS and the drivers. It has legitimate purposes, but
attackers have found a way to exploit this

A

Shimming

31
Q

: Refactoring is the process of restructuring existing code without changing the external behavior
of the code. This is oftentimes done to resolve readability issues or to improve nonfunctional attributes.
Attackers have found ways to use this to add functionality

A

Refactoring

32
Q

making data look like its coming from somewhere else

A

Spoofing

33
Q

MAC Spoofing

A

kdjfksjfs

34
Q

IP Spoofing

A

lksjdflksf

35
Q

It’s important to understand how a Smurf attack works as well. Spoofing is used, but in a Smurf
attack, the attacker spoofs a packet to all systems on a particular network and forges the From address so
that the target host gets all the echo replies.

A

Smurf attack