Vulnerabilities and Attacks Flashcards
Hardware Vulnerabilities
Security (flaws, weaknesses) inherent in the device’s physical components/design
Firmware
Software stored on the hardware device that provides the low-level control for device specific hardware
End-of-Life Systems
Systems reach the end of their lifecycle
Hardware Misconfigurations
When the device’s (settings, parameters, and/or options) are not set up optimally leading to unintended behaviors and vulnerabilities
Hardware Vulnerabilities Preventions
Hardening, patching, configuration enforcement, decommissioning, isolation, and segmentation
Configuration enforcement
Ensuring repeatable secure environments by making sure the configuration remains the same
Bluetooth vulnerabilities
Insecure pairing, device spoofing, on-path attacks
Insecure Pairing
When bluetooth devices establish a connection without proper authentication
On-path Attack
Exploits bluetooth protocol vulnerabilities to intercept/alter communications between devices without either party being aware
Bluetooth attacks
Bluejacking, BlueSnarfing, BlueBugging, BlueSmack, and BlueBorne
BlueJacking
Is sending an unsolicited message over bluetooth to test vulnerabilities
BlueSnarfing
Is unauthorized access via bluetooth to steal info like (calls, text messages, contacts)
BlueBugging
Is BlueSnarfing with the added feature trying to take control on the device
BlueSmack
Is a DDoS attack where we overwhelm a Bluetooth device to crash the device
Blueborne
A bluetooth attack of bouncing between devices via bluetooth
Mobile Vulnerability Types
Side Loading, Jailbreaking/Rooting, and Insecure connection methods
Mobile Device Management (MDM) Solution
Conduct patching of the devices by pushing necessary updates to the device
Zero Day Vulnerabilities
Any vulnerabilities that’s discovered or exploited it before the vendor can issue a patch for it
Zero Day Exploit
Any known exploit in the wild that exposes a previously unknown vulnerability in software’s hardware
Operating System Vulnerabilities
Unpatched Systems, Zero-Day Vulnerabilities, Misconfiguration, Data Exfiltration, and Malicious Updates
Data exfiltration
Unauthorized data transfers from within an organization to an external location
Malicious Updates
When an attacker has been able to craft a malicious update to a program to compromise the systems of the end-users
Code injection
The insertion of additional malicious data code through the data input form of a client to application
SQL injection
Looks like: ‘OR 1=1’ <- code injection but in the syntax of SQL