Malicious Activity & Hardening

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/263

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

264 Terms

1
New cards

What is a Denial of Service (DoS) attack?

An attack that makes a computer, server, or network unavailable to legitimate users by overwhelming resources or exploiting vulnerabilities.

2
New cards

What’s the goal of a DoS attack?

To disrupt normal operations and deny service to valid users.

3
New cards

What is a Distributed Denial of Service (DDoS) attack?

An advanced form of DoS where multiple compromised machines (bots) coordinate to flood a single target.

4
New cards

What is a ping flood attack?

An attacker sends excessive ICMP echo requests (pings) to exhaust the target's bandwidth or processing capacity.

5
New cards

How is a ping flood mitigated?

Block ICMP echo replies at the firewall—this causes attacker timeouts without affecting service.

6
New cards

What is a SYN flood attack?

Exploits the TCP three-way handshake by sending SYNs without completing the handshake, consuming server connection slots.

7
New cards

How do you mitigate SYN floods?

  • Use flood guards

  • Shorten SYN timeout

  • Deploy an Intrusion Prevention System (IPS)

8
New cards

What is Permanent Denial of Service (PDoS)?

A destructive attack that corrupts firmware to permanently disable a device.

9
New cards

What is a fork bomb?

A self-replicating process that rapidly consumes CPU and memory by exponentially creating child processes.

10
New cards

Is a fork bomb a worm?

No—it stays local to the attacked system and does not spread like a worm.

11
New cards

Why is DDoS more effective than DoS?

Because it uses multiple devices (botnets) to flood the target, bypassing modern defenses.

12
New cards

What is a botnet?

A network of compromised machines (bots) under control of an attacker, used to launch coordinated attacks.

13
New cards

What’s a DNS amplification attack?

An attacker sends small DNS requests with a spoofed victim IP, triggering large DNS replies sent to the victim.

14
New cards

How does DNS amplification amplify traffic?

Small queries return large DNS responses, flooding the target using minimal effort.

15
New cards

What was significant about the GitHub DDoS in 2018?

It reached 1.35 Tbps, briefly taking the site offline—yet GitHub recovered in 5 minutes, showcasing strong defenses.

16
New cards

What is blackholing or sinkholing?

Redirecting malicious traffic to a non-existent IP, discarding it before reaching the target.

17
New cards

What are limitations of blackholing?

Attackers can change IPs quickly, bypassing the sinkhole.

18
New cards

How do Intrusion Prevention Systems (IPS) help?

They can detect and block smaller-scale DoS but struggle with large-scale DDoS.

19
New cards

What is elastic cloud infrastructure?

An architecture that automatically scales resources to absorb high traffic during DDoS.

20
New cards

What's the downside of elastic scaling during a DDoS?

It can result in high cloud bills even for malicious, non-revenue-generating traffic.

21
New cards

What do companies like CloudFlare and Akamai offer for DDoS mitigation?

Web application firewalls + CDNs that filter and absorb traffic before it reaches the origin server.

22
New cards

Why are these services effective?

They offer robust, multi-layer defenses designed to withstand massive-scale attacks.

23
New cards

What are signs of a SYN flood on a test?

A web service is slow or unresponsive with lots of incomplete TCP handshakes.

24
New cards

What’s a hint that an attack is a DNS amplification?

Look for mention of spoofed DNS requests and disproportionately large responses.

25
New cards

What is the Domain Name System (DNS)?

It’s a core Internet component that translates human-readable domain names (like example.com) into IP addresses (like 192.0.2.1).

26
New cards

Why is DNS a common attack target?

Because compromising DNS can redirect traffic, disrupt services, or steal data.

27
New cards

What is DNS Cache Poisoning?

Corrupting a DNS resolver’s cache with false DNS records to redirect users to malicious sites.

28
New cards

How does DNS cache poisoning work?

An attacker injects fraudulent DNS records into a resolver’s cache, fooling users into visiting fake sites.

29
New cards

How do you mitigate DNS cache poisoning?

  • Use DNSSEC for authentication

  • Enforce secure network configurations and firewalls

30
New cards

What is a DNS amplification attack?

A DDoS attack where small queries trigger large responses from open DNS servers, overwhelming a victim.

31
New cards

How does DNS amplification use spoofed IPs?

The attacker sends requests with the victim's IP, so replies flood the victim, not the attacker.

32
New cards

How do you mitigate DNS amplification?

  • Rate limiting and response size limits

  • Disable open resolvers

33
New cards

What is DNS tunneling?

Using DNS queries to encapsulate non-DNS traffic (e.g., HTTP, SSH) and bypass firewall inspection.

34
New cards

Why is DNS tunneling dangerous?

It’s a covert channel for command-and-control (C2) or data exfiltration through Port 53.

35
New cards

How do you detect or prevent DNS tunneling?

  • Monitor DNS logs for anomalies

  • Use Deep Packet Inspection (DPI)

  • Implement DNS firewalling

36
New cards

What is domain hijacking?

Unauthorized takeover of a domain name’s registration, allowing attackers to redirect traffic or deface content.

37
New cards

How do attackers hijack domains?

Through access to registrar accounts via phishing or weak credentials.

38
New cards

How do you mitigate domain hijacking?

  • 2FA and strong passwords on registrar accounts

  • Registry lock services

  • Regularly update domain contact/security settings

39
New cards

What is a DNS zone transfer attack?

An attacker obtains entire DNS zone data by exploiting misconfigured DNS servers.

40
New cards

Why is zone transfer leakage dangerous?

It reveals internal IPs, hostnames, and services—valuable for reconnaissance.

41
New cards

How do you prevent zone transfer attacks?

  • Restrict zone transfers to trusted servers

  • Use Access Control Lists (ACLs)

42
New cards

What’s the key to protecting DNS infrastructure?

  • Apply DNSSEC

  • Secure DNS server configurations

  • Monitor logs and traffic

  • Enforce strong registrar security

43
New cards

What is an injection attack?

A type of attack where malicious input is inserted into an application interface to manipulate application logic or system behavior.

44
New cards

What is a directory traversal (path traversal) attack?

An attack that uses special character sequences to access files and directories outside the web root.

45
New cards

What characters are commonly used in directory traversal?

../ on Linux/macOS and ..\ on Windows.

46
New cards

What is the goal of a directory traversal attack?

To read or execute files outside the web-accessible directory, such as /etc/shadow.

47
New cards

How does a traversal path like ../../../../etc/shadow work?

Each ../ moves up one directory level from the web root to reach sensitive files.

48
New cards

What determines whether an attacker can access a file?

Whether the web server process has permission to read or execute the targeted file.

49
New cards

How does platform specificity affect traversal?

  • Linux/macOS: ../ (forward slash)

  • Windows: ..\ (backslash), but often accepts ../

50
New cards

What is URL encoding in traversal attacks?

Encoding ../ as %2e%2e%2f to bypass basic filters.

51
New cards

What is file inclusion?

A vulnerability where an attacker forces the web app to include a local or remote file during execution.

52
New cards

What is Remote File Inclusion (RFI)?

Attacker injects a URL to a remote script that the web app downloads and runs.

53
New cards

What is Local File Inclusion (LFI)?

Attacker points to a local file on the server, forcing the app to execute it.

54
New cards

What is a null byte injection (%00)?

Used in LFI to terminate file paths early, bypassing extensions like .php.

55
New cards

How does input validation help prevent directory traversal?

By blocking dangerous characters and accepting only known-safe patterns.

56
New cards

What’s better: whitelisting or blacklisting input?

Whitelisting, because blacklisting can miss obfuscated threats.

57
New cards

How does the Principle of Least Privilege apply?

Run web servers with minimum necessary access, limiting file exposure if exploited.

58
New cards

What can a Web Application Firewall (WAF) do?

Detect and block common traversal patterns and file inclusion attempts.

59
New cards

How does secure configuration help?

Store sensitive files outside the web document root, making them inaccessible to traversal.

60
New cards

What log pattern indicates a directory traversal attempt?

Presence of ../ or ..\ in a URL or parameter.

61
New cards

What’s the relationship between directory traversal and LFI?

LFI is a specific type of directory traversal, where local files are included and executed.

62
New cards

What’s the primary goal of RFI attacks?

Remote code execution by running attacker-controlled scripts.

63
New cards

What is Arbitrary Code Execution (ACE)?

A vulnerability that allows an attacker to run their own code on a victim’s machine.

64
New cards

How is ACE typically exploited?

By leveraging access (local or partial compromise) to execute attacker-supplied code.

65
New cards

What is Remote Code Execution (RCE)?

A specific form of ACE where attackers execute code on a system remotely over a network.

66
New cards

How does RCE differ from ACE?

RCE is network-based, whereas ACE may require local presence or access.

67
New cards

What is privilege escalation?

When a user or process gains higher access rights than intended or authorized.

68
New cards

What is vertical privilege escalation?

A standard user gains elevated privileges (e.g., administrator/root).

69
New cards

What is horizontal privilege escalation?

A user accesses another user’s resources at the same privilege level.

70
New cards

Why is privilege level important in attacks?

Code injected into an application runs with that application's privileges, possibly enabling further compromise.

71
New cards

What is a rootkit?

Malware designed to conceal its presence and maintain persistent, privileged access to a system.

72
New cards

What makes rootkits dangerous?

They are stealthy, persistent, and capable of installing malware, creating backdoors, and hiding network activity.

73
New cards

What are system privilege rings?

A hierarchical structure in operating systems used to control access:

  • Ring 0 – Kernel Mode (highest privilege)

  • Ring 3 – User Mode (least privilege)

74
New cards

What is a kernel-mode rootkit?

Operates at Ring 0, giving it complete control and making it very difficult to detect or remove.

75
New cards

What is a user-mode rootkit?

Operates at Ring 3, relying on OS components for persistence—less powerful than kernel-mode, but still significant.

76
New cards

ACE vs. RCE – what’s the key difference?

ACE = local or internal execution, RCE = execution over a network.

77
New cards

How are privilege escalation attacks categorized?

  • Vertical = gaining higher-level access

  • Horizontal = accessing peer-level data/resources

78
New cards

What’s a telltale sign of a rootkit?

Unexplained system behavior, logs missing, or processes that vanish from task lists.

79
New cards

What is a replay attack?

A network-based attack where valid data is maliciously rebroadcast, repeated, or delayed to perform unauthorized actions.

80
New cards

How does a replay attack work?

The attacker captures legitimate data transmissions and resends them later to trick a system into reprocessing them.

81
New cards

How is a replay attack different from session hijacking?

  • Replay attack: Reuses previously captured data.

  • Session hijacking: Manipulates an active session in real time.

82
New cards

What’s an example of a replay attack?

An attacker intercepts a user’s login credentials or session token during a bank login and reuses them later to gain account access.

83
New cards

What can an attacker do with a replayed session?

  • Gain unauthorized access

  • Perform transactions

  • Potentially lock out the real user

84
New cards

How do session tokens defend against replay attacks?

They are unique and time-limited. Once used or expired, a replayed token is rejected.

85
New cards

What are nonces used for?

Nonces are “numbers used once”—they make each session unique and prevent reuse.

86
New cards

How does Multi-Factor Authentication (MFA) help?

MFA requires an extra verification step, preventing access even if credentials are replayed.

87
New cards

How do secure protocols like WPA3 help?

They ensure session uniqueness and encrypt communications, preventing reuse of captured data.

88
New cards

What is the role of timestamps and sequence numbers?

They allow systems to detect outdated or duplicate packets, signaling a possible replay attempt.

89
New cards

What is a cryptographic challenge-response?

The server sends a random challenge, which the client encrypts and returns—ensuring the response is fresh and unique.

90
New cards

What’s the core defense strategy against replay attacks?

Combine robust session management, authentication, and modern secure protocols to invalidate reused transmissions.

91
New cards

What is the primary purpose of session management in web applications?

To uniquely identify a user and maintain their data state

92
New cards

Why are cookies used in web applications?

Because HTTP is a stateless protocol

93
New cards

What happens to session cookies when the browser is closed?

They are deleted automatically

94
New cards

What is session hijacking?

An attack where the attacker takes control of a valid session

95
New cards

How can session prediction attacks be prevented?

By generating session tokens using non-predictable algorithms

96
New cards

What is cookie poisoning?

Modifying the contents of a cookie to exploit vulnerabilities

97
New cards

Which of the following is a mitigation strategy against cookie poisoning?

Encrypting cookies during transmission and storage

98
New cards

What is the difference between session cookies and persistent cookies?

Session cookies are deleted when the browser closes, while persistent cookies remain until manually deleted or expired

99
New cards

Why is it important to encrypt cookies?

To maintain confidentiality of sensitive data

100
New cards

What is a key characteristic of a secure session token?

It is a one-time use ticket for the session duration