week 4 content Flashcards
___ team - A group authorized and organized to emulate a potential adversary’s attack or exploitation against an organizations network
red team
___ team - The group responsible for defending an organizations security posture against all adversary, internal or external
blue team
___ team - A collaborative cybersecurity group that brings together red and blue teams to test and improve security posture
purple team
___-_ - an individual or a group that performs malicious acts against cyber resources generally for monetary gain or disruption of service
adversary
___ - Techniques, tactic and procedures. A tactic is the highest level description of the behavior, while technique give more detailed description of behavior in the context of a tactic. Procedures are lowest level, highly detailed description in the context of a technique
TTP
____ ____ - A globally accessible knowledge base framework of adversary tactics and techniques based on real world observations.
Mitre attack
____ - Living Off the Land Binaries are binaries of a non-malicious nature, local to the operating system, to camouflage malicious activity
LOLBINS
_____ - common vulnerabilities and exposures is a database of publicly disclosed information security code flaws
CVE
____ ____ - use a single or small list of commonly used passwords against many different accounts for credential access
password spraying
____ ___ - use of credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap
credential stuffing
Threat actors place a high priority on targeting _____in their attacks
networks
Attacks that target a network or a process that relies on a network include:
* ______ attacks
*______ attacks
*_____attacks
* _____attacks
*_____attacks
Interception attacks
Layer 2 attacks
DNS
Distributed denial of service attacks
Malicious codding and scripting attacks
Interception attacks
In an ____, a threat actor is positioned in a communication between two parties
* The goal of it is to eavesdrop on the conversation or impersonate one of the parties
- it has two phases:
- ____ the traffic
- ____ the transmissions
a ___ attack makes a copy of a legitimate transmission before sending it to the
recipient
threat actors use several techniques for stealing an active session ID:
___ attacks: (hijacks and altered communication between two users)
____ attacks: (cross-site scripting, Trojans, and malicious JavaScript coding)
A _____ attack intercepts communication between parties to steal or manipulate the data
* It occurs between a browser and the underlying computer
usually begins with a ___infecting the computer and installing an
“extension” into the browser configuration
MITM (man in the middle)
intercept the traffic
decrypt the transmissions
replay attack
network attacks
endpoint attacks
MItb (man in the browser)
trojan
Advantages to a MITB attack:
difficult to ___
remains ___
resides in the web browser, hard to ___
recognize
dormant
detect
Layer 2 attacks
Layer 2, the Data Link Layer, is responsible for dividing the data into packets. A comprise here can affect the entire communication
____ ____ - Relies upon MAC spoofing, which is imitating another computer by means of
changing the MAC address
media access control attacks
MAC ____ attack - threat actors discover a valid MAC address of a device connected to a switch
they spoof the MAC address on and the switch changes its MAC address table to reflect the MAC address with the port to which the attacker’s device is connected
A MAC _____attack is another attack based on spoofing, MAC cloning, and the MAC address table of a switch A threat actor overflows the switch with Ethernet packets that have been spoofed so that every packet contains a different source MAC address
ARP poisoning
MAC cloning attack
MAC flooding attack