2.0 CompTIA Security+ SY0-701 2.0 Threats, Vulnerabilities, and Mitigations

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 170

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

171 Terms

1

Threat Actors

The entity responsible for an event that has an impact of the safety of another entity.

-Also called a malicious actor

Nation-State (External)

Unskilled attacker (External)

Hacktivist (External)

Insider threat (Internal)

Organized crime (External)

Shadow It (Internal)

New cards
2

Nation-State

External Entity

-Government and national security

Many possible motivations

-Data exfiltration, philosophical, revenge, disruption, war

Constant attacks, massive resources

-Commonly an Advanced Persistent Threat (APT)

Highest Sophistication

-Military control, utilities, financial control

-The United States and Israel destroyed 1,000 nuclear centrifuges with the Stuxnet worm.

New cards
3

Unskilled Attackers

Runs pre-made scripts without any knowledge of what really happening

Motived by the hunt

-Disruption, data exfiltration, and sometimes philosophical

Can be internal or external

-typically external

Not every sophisticated

No formal funding

New cards
4

Hacktivist

A hacker with a purpose

Motived by philosophy, revenge, disruption

Often, an external entity

-could infiltrate to be an insider threat

Can be remarkably sophisticated

-Very Specific hacks

-DoS, website defacing, private document release

Funding may be limited

New cards
5

Insider Threat

More than just passwords on sticky notes

-Motivated by revenge, financial gain

Extensive resources

-Using the organization's resources against themselves

An internal entity

-Eating away from the inside

Medium level of sophistication

-The insider has institutional knowledge

-Attacks can be directed at vulnerable systems

-The insider knows what to hit.

New cards
6

Organized Crime

Professional Criminals

-Motivated by money

-Almost always an external entity

Very sophisticated

-Best hacking money can buy

Crime that's organized

-One person hacks, one person manages the exploits, another person sells the data, and another handles customer support.

Lots of Capital to fund hacking efforts

New cards
7

Shadow IT

Going rogue

-Working around the internal IT organization

-builds their infrastructure

Information Technology can put up roadblocks

-Shadow IT is unencumbered

-Use the cloud

-Might also be able to innovate

Limited resources

-Company budget

Medium sophistication

-May not have IT training or knowledge

New cards
8

Threat Actor Attributes

Include the actor's relationship to the organization, motive, intent, and capability.

Internal/External

-The attack is inside the house

-They are outside and trying to get in

Resource/Funding

-No money

-Extensive funding

Level of Sophistication/Capability

-Blindly runs scripts or automated vulnerability scans

-Can write their own attack malware and scripts

<p>Include the actor's relationship to the organization, motive, intent, and capability.</p><p>Internal/External</p><p>-The attack is inside the house</p><p>-They are outside and trying to get in</p><p>Resource/Funding</p><p>-No money</p><p>-Extensive funding</p><p>Level of Sophistication/Capability</p><p>-Blindly runs scripts or automated vulnerability scans</p><p>-Can write their own attack malware and scripts</p>
New cards
9

Motivations

What makes an attacker tick?

-There is a purpose to this attack

Motivations include:

Data exfiltration

Espionage

Service disruption

Blackmail

Financial gain

Philosophical/political beliefs

Ethical

Revenge

Disruption/chaos

War

New cards
10

Threat Vectors and Attack Vectors

A method used by the attack to gain access or infect the target.

New cards
11

Message-Based Vectors

Email

-Malicious links in an email

-Link to malicious site

SMS (Short Message Service)

-Attacks in a text message

Instant Messaging (IM)

Phishing attacks

-People want to click links

-Links in email, links send via text or IM

Social Engineering Attacks

-Invoice scams

-Cryptocurrency scams

New cards
12

Image-based vectors

Some image formats can be a threat

- The SVG (Scalable Vector Graphic) Format

-Image is described in XML (Extensible Markup Language)

Significant security concerns

-HTML injection

-JavaScript attack code

Browsers must provide input validation

-Avoids running malicious code

New cards
13

File based Vectors

More than just executable

-Malicious code can hide in many places

Adobe PDF

-File format containing other objects

ZIP/RAR files (or any compression type)

-Contains many different files

Microsoft Office

-Documents with macros

-Add-in files

New cards
14

Voice call vectors

Vishing

-Phishing over the phone

Spam over IP

-Large-scale phone calls

War dialing

-it still happens

Call tampering

-Disrupting Voice Calls

New cards
15

Removable device vectors

Get around the firewall

-The USB interface

Malicious software on USB flash drives

-Infect air-gapped networks

-Industrial systems, high-security services

USB devices can act as keyboards

-Hacker on a chip

Data exfiltration

-Terabytes of data walk out the door

-Zero bandwidth used

New cards
16

Vulnerable Software Vectors

Client-Based

-Infected executable

-Known (or unknown) vulnerabilities

-May require constant updates

Agentless

- No installed executable

-Compromised software on the server would affect all users

-Clients runs a new instance each time

New cards
17

Unsupported Systems and Applications

Patching is an important prevention tool

-Ongoing security fixes

Unsupported systems aren't patched

-There may not even be an option

Outdated operating systems

-Eventually, even the manufacturer won't help

A single system could be an entry

-Keep your inventory and records current

New cards
18

Unsecured Networks

The network connects everything

-Ease of access for the attackers

-View all (non-encrypted) data

Wireless

-Outdated security protocols (WEP, WPA, WPA2)

-Open or rogue wireless networks

Wired

-Unsecured interfaces - No 802.1X

Bluetooth

-Reconnaissance

-Implementation Vulnerabilities

New cards
19

Open service ports

Most networks-based services connect over a TCP or UDP port

-An "open" port

Every open port is an opportunity for the attacker

-Application vulnerability or misconfiguration

Every application has its own open port

-More services expand the attack surface

Firewall rules

-Must allow traffic to an open port

New cards
20

Default credentials attack

Most devices have default usernames and passwords

-Ensure to change

The right credentials provide full control

-Administrator access

Very easy to find the defaults for your access point or router

New cards
21

Supply Chain Vector

Tamper with the underlying infrastructure

-Or manufacturing process

Managed service providers (MSPs)

-Access many different customer networks from on-location

Gain access to a network using a vendor.

-2013 Target credit card breach

Suppliers

-Counterfeit networking equipment

-Install backdoors, substandard performance, and availability of 2020 Fake Cisco Catalyst switches.

New cards
22

Human Vectors/Social Engineering (10)

Phishing

Vishing

Smishing

Misinformation/disinformation

Impersonation

Business Email compromise

Pretexting

Watering hole

Brand impersonation

Typo squatting

New cards
23

Phishing

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Social engineering with a touch of spoofing

-Often delivered by email, text, etc.

-Very remarkable when well done

Do not be fooled

-Check the URL

Usually, there is something not quite right

-Spelling, font, graphics

New cards
24

Vishing (voice or VoIP phishing)

Phishing attacks committed using telephone calls or VoIP systems.

-Caller ID spoofing is common

-Fake security checks or bank updates

New cards
25

SMishing (SMS Phishing)

Phishing using text messages

-Spoofing is a problem here as well

-Forwards links or asks for personal information

New cards
26

Variations on a theme

The fake check, phone verification code scam, Boss/CEO scam, and advance-free scam.

New cards
27

Misinformation/disinformation

Disseminate factually incorrect information

-Create confusion and division

Influence campaigns

-Sway public opinion on political and social issues

Nation-sate actors

-Divide, distract, and persuade

Advertising is an option

-Buy a voice for your opinion

Enabled through Social Media

-Creating, sharing, liking, amplifying

New cards
28

The misinformation process

Create fake users

Create content

Post on social media

Amplify Message

Real users share the message

Mass media picks up the story

New cards
29

Impersonation attack

An attacker assumes the identity of one of the legitimate parties in a network.

-Halloween for the fraudsters

Use some of those details from the reconnaissance

-You can trust me; I'm with your help desk

Attack the victim as someone higher in rank

-Office of the Vice President for Scamming

Throw tons of technical details around

-Catastrophic feedback due to the depolarization of the differential magnetometer

Be a buddy

-How about those cubs?

New cards
30

Eliciting Information

Procedures or techniques involving interacting with and communicating with others are designed to gather knowledge or inform.

Extracting information from the victim

- The victim does not even realize this is happening

-Hacking the human

Often seen with Vishing (Voice Phishing)

-Can be easier to get this information over the phone

New cards
31

identity fraud

A crime where one person uses another person's personal data, without authorization, to deceive or defraud someone else

Credit Card Fraud

-Open an account in your name, or use your CC information

Bank Fraud

-The attacker gains access to your account or opens a new one

Loan Fraud

-Your information is used for a loan or lease

Government Benefits Fraud

-The Attacker obtains benefits on your behalf

New cards
32

Default Settings

Every application and network device has a default login

-Not all of these are ever changed

Mirai botnet

-Takes advantage of default configurations

-Takes over Internet of Things (IoT) devices

-60+ default configurations

-Cameras, routers, doorbells, garage door openers, etc.

Mirai released as open-source software

-There is a lot more where that came from

New cards
33

Business Email Compromise (BEC)

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

We trust email sources

-The attackers take advantage of this trust

Spoofed email addresses

-Not really a legitimate email address

-Check spelling

Financial fraud

-Sends emails with updated bank information

-Modify wire transfer details

New cards
34

pretext

a false reason, deceptive excuse

Before the attack, the trap is set

-There is an actor and a story

Examples:

"Hello, sir; my name is Wendy, and I'm from Microsoft Windows. This is an urgent check-up call for your computer as we have found several problems with it."

Voicemail: " This is an enforcement action executed by the US Treasury intending your serious attention."

"Congratulations on your excellent payment history! You now qualify for 0% interest rates on all of your credit card accounts."

New cards
35

Watering Hole Attack

A malicious attack that is directed toward a small group of specific individuals who visit the same website.

The attacker determines which website the group uses

-Educated guess (Local coffee or sandwich shop)

-industry-related sites

Infect one of these third-party sites

-Site Vulnerability

-Email attachments

Infect all visitors

-But you are just looking for specific victims

-Now you are in

Watching the watering hole

Defense in depth

-Layered defense

-It is never one thing

Firewalls and IPS

-Stop the network traffic before things get bad

Anti-virus/ Anti-malware signature updates

New cards
36

Brand Impersonation

The specific form of impersonation where an attacker pretends to represent a legitimate company or brand

Pretend to be a well-known brand

-Coca-Cola, McDonald's, Apple, etc

Create tens of thousands of impersonated sites

-Get into the Google index, click an ad, get a WhatsApp Message

Victors are presented with a pop-up

-You won! Special offer! Download the Video!

New cards
37

Pretexting

A form of social engineering in which one individual lies to obtain confidential data about another individual

-Lying to get information

-An attacker is a character in a situation that creates

-"Hi, we are calling from Visa regarding an automated payment to your utility services...."

New cards
38

Finding Malware

Malware runs in memory

-Memory forensics can find the malicious code

The memory contains running processes

-DLLs (Dynamic Link Libraries)

-Threads

-Buffers

-Memory management functions and more

Malware is hidden somewhere

-Malware runs in its own process

-Malware injects itself into a legitimate process

New cards
39

Memory Injection

Add code into the memory of an existing process

-Hide malware inside the process

Get access to the data in that process

-The Same rights and permissions

-Performs a privilege escalation

New cards
40

DLL Injection (Dynamic Link Library)

An attack that injects a Dynamic Link Library (DLL) into memory and runs it. Attackers rewrite DLL, inserting malicious code.

Dynamic-Link Library

-A Windows library containing code and data

-many applications can use this library

Attackers inject a path to a malicious DLL

-Runs as part of the target process

One of the most popular memory injection methods

-Relatively easy to implement.

New cards
41

buffer overflow attack

An attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

Overwriting a buffer of memory

-Spills over into other memory areas

Developers need to perform bounds-checking

-The attacker spends much time looking for an opening

Not a simple exploit

-Takes time to avoid crashing things

-Takes time to make it do what you want

A really useful buffer overflow is repeatable

-Which means that a system can be compromised

New cards
42

Race conditions(Time of check/time of use)

When a software program depends on the timing of one or more processes to function correctly

A programming conundrum

-Sometimes, things happen at the same time

-This can be bad if you've not planned for it

Time-of-check to time-of-use attack (TOCTOU)

-Check the system

-When do you use the results of your last check?

-Something might happen between the check and the use

<p>When a software program depends on the timing of one or more processes to function correctly</p><p>A programming conundrum</p><p>-Sometimes, things happen at the same time</p><p>-This can be bad if you've not planned for it</p><p>Time-of-check to time-of-use attack (TOCTOU)</p><p>-Check the system</p><p>-When do you use the results of your last check?</p><p>-Something might happen between the check and the use </p>
New cards
43

Operating System (OS)-based

A Foundational Computing Platform

Remarkably Complex

The vulnerabilities are already in there - just not located yet.

Best Practices

-Always update

-May require testing before deployment

-May require a reboot

New cards
44

web-based

Applications that you access over the Internet

New cards
45

Code Injection

A method used by hackers to insert malicious code into otherwise legitimate files or data transmissions.

- Adding your own information into a data stream

Enabled because of bad programming

-The application should properly handle input and output

So many different data types

-HTML, SQL, XML, LDAP, etc.

New cards
46

Structured Query Language (SQL)

An international standard language for processing a database

- The most common relational database management system language

<p>An international standard language for processing a database</p><p>- The most common relational database management system language</p>
New cards
47

Structured Query Language (SQL) injection

A type of attack in which the hacker adds SQL code to a Web or application input to gain access to or alter data in the database is called ___.

It can often be executed in a web browser

-Inject in a form or field

-Add more information to the query " '1' = '1'";

New cards
48

Cross-Site Scripting (XSS)

An attack that injects scripts into a Web application server to direct attacks at clients.

XSS

-Cascading Style Sheets (CSS) are completely different

Originally called "cross-sit" because of browser security flaws

-Information from one site could be shared with another

One of the most common web app vulnerabilities

-Takes advantage of the trust a user has in a site

-Complex and varied

Cross-site scripting process

1. The attacker sends a link containing a malicious script to a victim

2. The victim clicks the link and visits the legitimate site

3. Legitimate site loads are in the victim's browser. Malicious script is also executed

4. malicious script sends victim data (Session cookies, etc.) to the attacker.

New cards
49

Non-persistent (reflected) XSS attack

The website allows scripts to run in user input

-Search box is a common source

The attacker emails a link that takes advantage of this vulnerability

-Runs a script that sends credentials/session IDs/ cookies to the attacker.

Script embedded in URL executes in the victim's browser

-As if it came from the server

Attacker uses credentials/session IDs/ Cookies to steal victim's information without their knowledge

-Very sneaky

New cards
50

Persistent (stored) XSS attack

The attacker posts a message to a social network

- Includes the malicious payload

It is now "persistent" - Everyone gets the payload

No specific target - All viewers to the page

For social networking, this can spread quickly

- Everyone who views the message can have it

posted to their page

- Where can someone else view it and propagate it further..

New cards
51

Protecting against XSS

Be careful when clicking untrusted links

-Never blindly click in your email inbox

Consider disabling JavaScript

-Or control with an extension

-This offers limited protection

Keep your browser and applications updated

-Avoid the nasty browser vulnerabilities

Validate input

-Don't allow users to add their own scripts to an input field

New cards
52

Firmware

Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.

The software inside the hardware

-The operating system of the hardware device

Vendors are the only ones who can fix their hardware

-Assuming they know about the problem and care about fixing it

New cards
53

End of Life (EOL)

-Manufacturer stops selling a product

-May continue supporting the product

-Important for security patches and updates

New cards
54

End of Service Life (EOSL)

-Manufacturer stops selling a product

-Support is no longer available for the product

-No ongoing security patches or updates

-May have a premium-cost support option

** Significant concern

New cards
55

Legacy platforms

used to describe systems that are no longer being marketed or supported

Some devices remain installed for a long time

-Perhaps too long

Legacy devices

-Older operating systems, applications, middleware

May be running end-of-life software

-The risk needs to be compared to the return

May require additional security protections

-Additional firewall rules

-IPS signatures for older operating systems

New cards
56

Virtualization Security

Quite different than non-virtual machines

-Can appear anywhere

Quantity of resources varies between Virtual Machines (VM)

-CPU, memory, storage

There are many similarities to physical machines

-Complexity adds opportunity for the attackers

Virtualization vulnerabilities

-Local privilege escalations

-Command injection

-Information disclosure

New cards
57

Virtual Machine Escape

When a user (or malware) is able to break out of a VM's isolation (or lack thereof) and gain access to the hosting computer.

-Break out of the VM and interact with the host operating system or hardware.

Once you escape the VM, you have great control

-Control the host and control other guest VMs

New cards
58

Resource Reuse

The hypervisor manages the relationship between physical and virtual resources

-Available RAM, storage space, CPU availability, etc.

These resources can be reused between VMs

-Hypervisor host with 4 GB of RAM each

-Supports three VMs with 2 GB of RAM each

-RAM is allocated and shared between VMs

Data can inadvertently be shared between VMs

-Time to update the memory management features

-Security patches can mitigate the risk

New cards
59

Cloud-specific Vulnerabilities

ATTACK THE SERVICE

Denial of Service (DoS)

- A fundamental attack type

Authentication Bypass

-Take advantage of weak or faulty authentication

Directory traversal

-Faulty configurations put data at risk

Remote code execution

-Take advantage of unpatched systems

ATTACK THE APPLICATION

Web application attacks have increased

-Log4j and Spring Cloud Function

-Easy to exploit, rewards are extensive

Cross-site scripting (XSS)

-Take advantage of poor input validation

Out of bounds write

-Write to unauthorized memory areas

-Data corruption, crashing, or code execution

SQL injection

-Get direct access to a database

New cards
60

Supply Chain Risk

The Chain contains many moving parts

-Raw materials, suppliers, manufacturers, distributors, customers, consumers

Attackers can infect any step along the way

-Infect different parts of the chain without suspicion

-People trust their suppliers

One exploit can infect the entire chain

New cards
61

Service providers

You can control your own security posture

-You can't always control a service provider

Service providers often have access to internal services

-An opportunity for the attacker

Many different types of providers

-Network, utility, office cleaning, payroll/accounting, cloud services, system administration, etc.

Consider ongoing security audits of all providers

-Should be included with the contract

New cards
62

Hardware providers

Can you trust your new server/router/switch/firewall/software?

-Supply chain cyber security

Use a small supplier base

-Tighter control of vendors

Strict controls over policies and procedures

-Ensure proper security is in place

Security should be part of the overall design

-There's a limit to trust

New cards
63

Software providers

Trust is a foundation of security

-Every software installation questions our trust

Initial installation

-Digital signature should be confirmed during installation

Updates and patches

-Some software updates are automatic

-How secure are the updates

Open source is not immune

-Compromising the source code itself

New cards
64

Cryptographic

New cards
65

Open permissions

Very easy to leave a door open

-The hackers will always find it

Increasingly common with cloud storage

-Statistical chance of finding an open permission

New cards
66

Unsecured Admin Accounts

The Linux root account

-The Windows Administrator or superuser account

Can be a misconfiguration

-Intentionally configuring an easy-to-hack password

-123456, ninja, football

Disable direct login to the root account

-Use the su or sudo option

Protect accounts with root or administrator access

-There should not be a lot of these

New cards
67

Insecure Protocols

Some protocols are not encrypted

-All traffic sent in the clear

-Telnet, FTP, SMTP, IMAP

Verify with a packet capture

-View everything sent over the network

Use the encrypted versions

-SSH, SFTP, IMAPS, etc.

New cards
68

Typosquatting/URL hijacking

Websites with names similar to real Web sites; users making typographical errors are sent to a site filled with malware.

New cards
69

Open ports and services

Services will open ports

-It's important to manage access

Often managed with a firewall

-Manage traffic flows

-Allow or deny based on port number or application

Firewall rulesets can be complex

-It's easy to make a mistake

Always test and audit

-Double and triple check

New cards
70

Mobile device security

Challenging to secure

-Often need additional security policies and systems

Relatively small

-Can be almost invisible

Almost always in motion

-You never know where it might be

Packed with sensitive data

-Personal and organizational

Constantly connected to the Internet

-Nothing bad happens on the Internet

New cards
71

Jailbreaking/rooting

Mobile devices are purpose-built systems

-You do not have access to the operating system

Gaining access

-Android - Rooting

-Apple iOS - Jailbreaking

Install custom firmware

-Replaces the existing operating system

Uncontrolled access

-Circumvent security features the

-The MDM becomes relatively useless

New cards
72

Sideloading

Malicious apps can be a significant security concern

-One Trojan horse can create a data breach

Manage installation sources

-The global or local app store

Sideloading circumvents security

-Apps can be installed manually without using an app store

-Again, your MDM becomes relatively useless

New cards
73

zero-day attack

Attack that exploits previously unknown vulnerabilities, so victims have no time (zero days) to prepare for or defend against the attack.

-An attack without a patch or method of mitigation

-A race to exploit the vulnerability or create a patch

-Difficult to defend against the unknown

New cards
74

Common Vulnerabilities and Exposures (CVE)

An online list of known vulnerabilities (and patches) to software, especially web servers. The MITRE Corporation maintains it.

New cards
75

Malware

Malicious software

-These can be very bad

Gather information

-Keystrokes

Show you advertising

-Big money

Viruses and worms

-Encrypt your data

-Ruin your day

New cards
76

Malware Attacks

Ransomware

Trojan

Worm

Spyware

Bloatware

Virus

Keylogger

Logic bomb

Rootkit

New cards
77

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

Malware encrypts your data files

-Pictures, documents, music, movies, etc.

-Your OS remains available

-They want your running but not working

You must pay the attacker to obtain the decryption key

-Untraceable payment system

-An unfortunate use of public-key cryptography

Protecting against ransomware

-always have a backup (offline)

-Key your operating systems up to date

-Keep your anti-virus/anti-malware signatures up to date

New cards
78

Trojan

A program disguised as a harmless application that actually produces harmful results.

New cards
79

Worms

Malware that self-replicates

-Does not need you to do anything

-Uses the network as a transmission medium

-Self-propagates and spreads quickly

Firewalls and IDS/IPS can mitigate many worm infestations

-Does not help much once the worm gets inside

New cards
80

Wannacry Worm

May 12, 2017 this worm propagated fast and encrypted personal files

New cards
81

Spyware

Malware that spies on you

-Advertising, identity theft, affiliate fraud

Can trick you into installing

-Peer-to-peer, fake security software

Browser monitoring

-Capture surfing habits

Key loggers

-Capture every keystroke

-Send your keystrokes back to the attacker.

RUN SOME SCANS

-Malwarebytes

New cards
82

Bloatware

A new computer or phone

-Includes the operating system and important apps

Includes applications you didn't expect

-Often do not need

Uses valuable storage space

-May also add to overall resource usage

-The system may be slower than expected could open your system to exploit

New cards
83

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Malware that can reproduce itself

-It needs you to execute a program

Reproduces through file systems or the network

-Just running a program can spread a virus

May or may not cause problems

-Some viruses are invisible and some are annoying

Anti-virus is very common

-Thousands of new viruses every week

-Is your signature file updated?

New cards
84

Virus types

Program viruses

-Part of the application

Boot sector viruses

-Who needs an OS?

Script viruses

-Operating system and browser-based

Macro viruses

-Common in Microsoft Office

New cards
85

Fileless virus

Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

A stealth attack

-Does a good job of avoiding anti-virus detection

Operates in memory

-But never installed in a file or application

New cards
86

Keyloggers

Your keystrokes contain valuable information

-Website login URLs, passwords, email messages

Save all of your input

-Send it to the bad guys

Circumvents encryption protections

-Your keystrokes are in the clear

Other data logging

-Clipboard logging, screen logging, instant messaging, search engine queries

New cards
87

Logic bomb

Waits for a predefined event

-Often left by someone with a grudge

Time bomb

-Time or date

User event

-Logic bomb

Difficult to identify

-Difficult to recover if it goes off

New cards
88

Rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge.

Orginally a Unix technique

-The "root" in rookit

Modifies core system files

-Part of the kernel

Can be invisible to the operating system

-Will not see it in Task Manager

Aslo invisible to traditional anti-virus utilities

-If you can not see it you can not stop it

New cards
89

Physical Attacks

Brute force

Radiofrequency identification (RFID) cloning

Environmental

New cards
90

brute force attack

The physical version

-No password required

Push through the obstruction

-Bran beats brain

Check your physical security

-Check the windows

-Try the doors

New cards
91

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

New cards
92

RFID cloning

Which attack enables a penetration tester to duplicate access cards and is of particular value during physical penetration tests?

RFID is everywhere

-Access badges

-Key fobs

Duplicators are on Amazon

-Less than $50

The duplication process takes seconds

-Read one card

-Copy to another

This is why we have MFA

-Use another factor with the card

New cards
93

Environmental attacks

Attack everything supporting technology

-The operating environment

Power monitoring

-An obvious attack

HVAC (Heating, Ventilation, and Air Conditioning) and humidity controls

-Large data centers must be properly cooled

Fire suppression

-Watch for smoke or fire

New cards
94

Network Attacks

Distributed denial-of-service (DDoS)

-Amplified

-Reflected

Domain Name System (DNS) attacks

Wireless

On-path

Credential replay

Malicious Cod

New cards
95

Denial of Service (DoS)

Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity.

Force a service to fail

-Overload the service

Take advantage of a design failure or vulnerability

-Keep your systems patched

Cause a system to be unavailable

-Competitive advantage

Create a smokescreen for some other exploit

-Precursor to a DNS spoofing attack

Dose not have to be complicated

-Turn off the power

New cards
96

A "friendly" DoS

Unintentional DoSing

-It is not always a ne-er-do-well

Network DoS

-Lay 2 loop with STP

Bandwidth DoS

-Downloading multi-gigabyte Linux distributions over a DSL line

The water line breaks

-Get a good shop vacuum

New cards
97

distributed denial-of-service (DDoS) attack

Many computers collaborate to shut down a target, usually by keeping it busy or overwhelming it with incoming requests.

Launch an army of computers to bring down a service

-Use all the bandwidth or resources -traffic spike

This is why the attacks have botnets.

-Thousands or millions of computers at your command

-At it's peak, Zeus botnet infected over 3.6 million PCs

-Coordinated attack.

Asymmetric threat

-The attacker may have fewer resources than the victim

New cards
98

DDoS Reflection and Amplification

Turn your small attack into a big attack

-Often reflected off another device or service

An increasingly common network DDoS technique

-Turn Internet services against the victim

Uses protocols with little (if any) authentication or checks

-NTP, DNS, ICMP

-A common example of protocol abuse

<p>Turn your small attack into a big attack</p><p>-Often reflected off another device or service </p><p>An increasingly common network DDoS technique</p><p>-Turn Internet services against the victim</p><p>Uses protocols with little (if any) authentication or checks</p><p>-NTP, DNS, ICMP</p><p>-A common example of protocol abuse </p>
New cards
99

DNS amplification DDoS

knowt flashcard image
New cards
100

DNS (Domain Name System) poisoning

Modify the DNS server

-Requires some crafty hacking

Modify the client host file

-The host file takes precedence over DNS queries

Send a fake response to a valid DNS request

-Requires a redirection of the original request or the resulting response

-Real-time redirection

-This is an on-path attack

<p>Modify the DNS server</p><p>-Requires some crafty hacking</p><p>Modify the client host file</p><p>-The host file takes precedence over DNS queries </p><p>Send a fake response to a valid DNS request</p><p>-Requires a redirection of the original request or the resulting response</p><p>-Real-time redirection</p><p>-This is an on-path attack </p>
New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot