Vulnerabilities and Attacks Flashcards

1
Q

Hardware Vulnerabilities

A

Security (flaws, weaknesses) inherent in the device’s physical components/design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firmware

A

Software stored on the hardware device that provides the low-level control for device specific hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End-of-Life Systems

A

Systems reach the end of their lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware Misconfigurations

A

When the device’s (settings, parameters, and/or options) are not set up optimally leading to unintended behaviors and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware Vulnerabilities Preventions

A

Hardening, patching, configuration enforcement, decommissioning, isolation, and segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration enforcement

A

Ensuring repeatable secure environments by making sure the configuration remains the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bluetooth vulnerabilities

A

Insecure pairing, device spoofing, on-path attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Insecure Pairing

A

When bluetooth devices establish a connection without proper authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-path Attack

A

Exploits bluetooth protocol vulnerabilities to intercept/alter communications between devices without either party being aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bluetooth attacks

A

Bluejacking, BlueSnarfing, BlueBugging, BlueSmack, and BlueBorne

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BlueJacking

A

Is sending an unsolicited message over bluetooth to test vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BlueSnarfing

A

Is unauthorized access via bluetooth to steal info like (calls, text messages, contacts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BlueBugging

A

Is BlueSnarfing with the added feature trying to take control on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BlueSmack

A

Is a DDoS attack where we overwhelm a Bluetooth device to crash the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Blueborne

A

A bluetooth attack of bouncing between devices via bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mobile Vulnerability Types

A

Side Loading, Jailbreaking/Rooting, and Insecure connection methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mobile Device Management (MDM) Solution

A

Conduct patching of the devices by pushing necessary updates to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Zero Day Vulnerabilities

A

Any vulnerabilities that’s discovered or exploited it before the vendor can issue a patch for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zero Day Exploit

A

Any known exploit in the wild that exposes a previously unknown vulnerability in software’s hardware

20
Q

Operating System Vulnerabilities

A

Unpatched Systems, Zero-Day Vulnerabilities, Misconfiguration, Data Exfiltration, and Malicious Updates

21
Q

Data exfiltration

A

Unauthorized data transfers from within an organization to an external location

22
Q

Malicious Updates

A

When an attacker has been able to craft a malicious update to a program to compromise the systems of the end-users

23
Q

Code injection

A

The insertion of additional malicious data code through the data input form of a client to application

24
Q

SQL injection

A

Looks like: ‘OR 1=1’ <- code injection but in the syntax of SQL

25
Extensible Markup Language (XML)
Used by web applications for authentication, authorization, and other types of data exchange
26
XML Bomb (Billion Laughs ATTACK)
XML encodes entities that expand to exponential sizes, concealing memory on the host, eventually crashing it
27
XML External Entity (XXE)
An attack that embeds a request for a local resource
28
(Font, Image, Href)
HTML
29
(Question, ID, Type, Element, Entity)
XML
30
Cross-Site Scripting
Injects a malicious script into a trusted website to compromise the site's visitors; Basically a leak from a trusted website with a script appended to the end, that the browser runs instantly
31
Non-Persistent Cross-Site Script
Will run once when launched
32
Persistent Cross-Site Script
Will try to wedge itself into the database of the website to be run everytime
33
Document Object Model (DOM) XSS
Exploits the web browser specifically with client-side JavaScript; DOM commands
34
Any URL with JS attached to it is a
Cross-size scripting attack
35
If it has a document attached in the script
It is a DOM-based XSS
36
Session Management
Enables web apps to uniquely identify a user across different actions and requests
37
Session Hijacking
Type of spoofing attack where the attacker disconnects a host and replaces it with their machine by spoofing the IP and their cookies
38
Section Prediction
Type of spoofing attack where the attacker attempts to predict the session token in order to hijack
39
Cross-site request forgery (XSRF)
Script is used to exploit a session started on another site within the same web browser
40
Buffer Overflow
Occurs when data extends outside of its allocated memory range, potentially allowing unauthorized access of code execution
41
Stack
The region where a program stores the return address from functioning calls
42
"Smashing the stack"
When an attacker can execute their malicious code by overwriting the return address
43
Race Conditions
Software vulnerability where the outcome depends on the timing events not matching the developer's intended order
44
Race Condition Time of Check (TOC)
The attacker can alter system rescores after an application checks its state but before the operation is performed
45
Race Condition Time of Use (TOU)
When an attacker can change the state of a system resource between the time it's checked and the time it's used
46
Race Condition Time of Evaluation (TOE)
Involves the manipulation of data or resources during the time when the system is making decision or evaluation