CSEC 280 Module 02

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/111

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

112 Terms

1
New cards

Motive

Originates out of the notion that the target system stores or processes something valuable which leads to threats of attacks on the system

2
New cards

Passive Attack

Attacker does not tamper with the data and involve intercepting and monitoring network traffic and data flow on the target network

3
New cards

Active Attack

Attacker tampers with the data in transit or disrupt the communication or services between the systems to break or bypass into secured systems

4
New cards

Close-in Attack

Performed when the attacker is in close physical proximity with the target system or network.

5
New cards

Insider Attacks

Involve using privileged access to violate rules or intentionally cause a threat to the organization's information or information systems

6
New cards

Distribution Attack

Occur when attackers temper with hardware or software prior to installation

7
New cards

Hacking

Refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.

8
New cards

Tactics

Guidelines that describe the way an attacker performs an attack from beginning to end

9
New cards

Techniques

The technical methods used by an attacker to achieve intermediate results during the attack

10
New cards

Procedures

Organizational approaches that threat actors follow to launch an attack

11
New cards

MITRE ATT&CK

Globally accessible knowledge base of adversary tactics and techniques based on real-world observations

12
New cards

Reconnaissance Attacks

Attackers attempt to discover information about the target network

13
New cards

Network Scanning

A set of procedures used for identifying hosts, ports, and services in a network

14
New cards

DNS Footprinting

Provide important information about the locations and types of servers

15
New cards

Packet Sniffing

The process of monitoring and capturing all data packets passing through a given network using a software application or hardware device

16
New cards

Man-in-the-Middle Attack

Used to intrude into an existing connection between systems and intercept the messages being exchanged

17
New cards

DNS Posioining

The unauthorized manipulation of IP addresses in the DNS cache

18
New cards

Domain Hijacking

An attack that changes the registration of a domain name without permission from the owner.

19
New cards

ARP Spoofing Attack

A protocol used for mapping an IP address to a physical machine address which is recognized in the local network

20
New cards

DHCP Spoofing Attack

The attacker sets up a rouge DHCP server on the network and responds to DHCP requests with bogus IP addresses resulting in compromised network access

21
New cards

Switch Port Stealing

Uses Mac Flooding to sniff the packets

22
New cards

MAC Spoofing/Duplicating/Cloning

By listening to the traffic on the network, a malicious user can intercept and use a legitimate user's MAC address to receive all the traffic destined for the user

23
New cards

MAC Flooding

involves the flooding of the CAM table with fake MAC address and IP pairs until it is full.

24
New cards

IP Address Spoofing

Changes the source IP addresses so that the attacker appears to be coming form someone else

25
New cards

Denial-of-Service Attack

A coordinated attack that involves a multitude of compromised systems attacking a single target, thereby denying service to users of the targeted system

26
New cards

Distributed Reflection DoS (DRDoS)

A network-based attack where the attacker dramatically increases the bandwidth sent to a victim during a DDoS attack by implementing an amplification factor.

27
New cards

Malware Attacks

Any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

28
New cards

Advanced Persistent Threat (APT)

A network threat, where an attacker gains unauthorized access to a target network and remain undetected for a long period of time

29
New cards

Malicious universal serial bus (USB) cable

A USB with additional electronics that may tell your computer it is a keyboard or mouse. This allows it to type anything it wants into the system. It would then start up a command prompt, type in some commands to download some malware from a third party site.

30
New cards

Card cloning

The process of creating a duplicate of a credit card or access card by copying information from the original card

31
New cards

Malicious Flash Drive

a physical device that contains malicious PDFs, files, etc that could be harmful to your computer, older systems would automatically upload from this physical device without user consent

32
New cards

Skimming

The process of extracting payment and personal information from credit card users using special devices

33
New cards

Injection Flaws

Web application vulnerabilities that allow untrusted data to be interpreted and executed as part of a command or query

34
New cards

Cross-Site Scripting (XSS)

Exploits Web page security vulnerabilities to bypass browser security mechanisms and create a malicious link that injects unwanted code into a Web site.

35
New cards

Parameter Tempering Attack

Involves the manipulation of parameters exchanged between client and server in order to modify application data such as user credentials and permissions, price, quantity of products

36
New cards

Directory Transversal Attack

Attackers use ../ sequence to access restricted directories outside the web server root directory

37
New cards

Cross-Site Request Forgery

An attack that uses the user's Web browser settings to impersonate the user.

38
New cards

DNS Amplification Attack

Attacker takes advantage of the DNS recursive method of DNS redirection.

39
New cards

Server-Side Request Forgery (SSRF)

An attack that takes advantage of a trusting relationship between web servers.

40
New cards

Application Level DoS Attack

Attackers exhaust available servers by sending hundreds of resource-intensive requests

41
New cards

XML External Entity

A server-side forestry attack that can occur when a misconfigured XML parser allows applications to parse XML input from unreliable sources

42
New cards

Watering Hole Attack

An attack method that infects web sites that a group is likely to trust and visit.

43
New cards

Man-in-the-Browser Attack

Trojan horse that intercepts data passing through the browser

44
New cards

Session Replay Attack

Attacker listens to the conversation between the user and the server and captures the authentication token of the user

45
New cards

Secure Socket Layer (SSL) Stripping

A technique of demoting website security from HTTPS to the less secure HTTP

46
New cards

Password Cracking

Technique used to crack passwords of users on the target system

47
New cards

Dictionary Attack

A dictionary file is loaded into the cracking application that runs against user accounts

48
New cards

Brute-Force Attack

The password cracker tries every possible combination of characters

49
New cards

Rule-based Attack

Attacker has some information about the password.

50
New cards

Hash Injection

Allows an attacker to inject a compromised hash into a local session and use the hash to validate network resources

51
New cards

Rainbow Table

A precomputed table for reversing cryptographic hash functions, usually for cracking password hashes

52
New cards

Compare the Hashes

An attacker captures the hash of a password and compares it with the precomputed hash table. If a match is found, then the password is cracked. It is easy to recover passwords by comparing captured password hashes to the pre-computed tables.

53
New cards

Easy to Recover

An easy way to recover passwords by comparing the captured password hashes to the precomputed tables

54
New cards

Zero-day Attacks

Attacks that exploit previously unknown vulnerabilities, so victims have no time (zero days) to prepare or defend against the attacks.

55
New cards

Buffer Overflow

A technique for crashing by sending too much data to the buffer in a computer's memory

56
New cards

Return-Oriented Programming (ROP) Attack

An exploitation technique used by attackers to execute arbitrary malicious code

57
New cards

Privilege Escalation

An attacker can gain access to the network using a non-admin user account and the next step would be to gain administrative privilege's

58
New cards

DLL Hijacking

Loading a malicious DLL in the application directory so that when the application executes, it will choose the malicious DLL

59
New cards

Application Shimming

Used to provide compatibility between the older and newer versions of the Windows OS

60
New cards

Refactoring

The process of modifying the non-functional code of driver software without affecting the actual operation of the driver

61
New cards

Social Engineering

The art of manipulating people so they give up confidential information

62
New cards

Impersonation

The attacker pretends to be someone legitimate or an authorized

63
New cards

Eavesdropping

Unauthorized listening of conversations, or reading of messages

64
New cards

Shoulder Surfing

A direct observation techniques, such as looking over someone's shoulder, to get information.

65
New cards

Dumpster Diving

Looking for treasure in someone else's trash.

66
New cards

Reverse Social Engineering

The attacker presents him/herself as an authority and the target seeks his or her advice before or after offering the information that the attacker needs

67
New cards

Piggybacking

An authorized person intentionally allows an unauthorized person to ass through a secure door

68
New cards

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

69
New cards

Hoax Letters

Emails that issue warnings to the user about new viruses, Trojans, or worms that may harm the user's system.

70
New cards

Spam Email

Irrelevant, unwanted, and unsolicited emails that attempt to collect financial information, social security numbers, and network information

71
New cards

Instant Chat Messenger

Gathering personal information by chatting with a selected user online to get information such as birth dates and maiden names

72
New cards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

73
New cards

Credential Harvesting

Attacker employ TTPs such as phishing campaigns, password dumping tools, to perform credential stuffing

74
New cards

Typosquatting

Attackers register domain names with intentionally misspelled versions of well-known websites to send unsuspecting visitors to malicious websites

75
New cards

Elicitation

A technique to extract information from a target without arousing suspicion.

76
New cards

Identity Theft

A crime that involves someone pretending to be another person in order to steal money or obtain benefits

77
New cards

Influence Campaigns

Using social engineering to sway attention and sympathy in a particular direction.

78
New cards

Rouge AP Attack

Placed into an 802.11 network can be used to hijack the connections of legitimate network users

79
New cards

AP MAC Spoofing

Hackers spoof the MAC address of WLAN client equipment to mask as an authorized client

80
New cards

War Driving

The act of searching for instances of wireless LAN networks while in motion, using wireless tracking devices like PDAs, mobile phones, or laptops.

81
New cards

Evil Twin

A wireless network with the same name as another wireless access point. Users unknowingly connect to the evil twin; hackers monitor the traffic looking for useful information.

82
New cards

Jamming Signal Attack

An attacker stakes out the area from a nearby location with a high-gain amplifier drowning out the legitimate AP

83
New cards

Dissociation Attack

The attacker makes the victim unavailable to other wireless network devices by destroying the connectivity between the AP and client

84
New cards

De-authentication Attack

The attacker flood(s) with forged de-authenticates or disassociates to disconnect users from an AP

85
New cards

Reverse Engineering

Attackers perform reverse engineering by gaining access to the chip and reading its memory contents optically to retrieve the PIN, biometric data, personal information, etc.

86
New cards

Power Analysis Attack

A type of side-channel attack that enables attackers to crack passwords by analyzing the power-consumption patterns of a network device

87
New cards

RFID Cloning/Spoofing

Involves capturing the data from a legitimate RFID tag and then creating a clone of it using a new chip

88
New cards

Data Modification Attack

A more dangerous attack that not only captures and stores the target's data exchange but also modifies it using a radio-frequency device

89
New cards

Data Corruption Attack

A type of DoS attack performed by interfering or disrupting the data transmission or blocking the data channel so that the receiver is not able to decipher or read the data received

90
New cards

Sandboxing

Protect systems and users by limiting the resources the app can access to the mobile platform

91
New cards

Mobile Spam

Unsolicited messages sent in bulk form to known/unknown phone numbers/email IDs to target mobile phones.

92
New cards

SMS Phishing

The act of trying to acquire personal and financial information by sending SMSs containing deceptive links

93
New cards

Android Rooting

Involves exploiting security vulnerabilities in the device firmware and copying the SU binary to a location in the current process's path and grating it executable permission with chmod command

94
New cards

Jailbreaking iOS

Defined as the process of installing a modified set of kernel patches that allows users to run third-party applications not signed by the OS vendor

Provides root access to the operating system and permits downloading of third-party applications, themes, extensions on iOS devices

Removes sandbox restrictions, which enables malicious apps to access restricted mobile resources and info

95
New cards

Metasploit

Allows testers to scan systems for vulnerabilities, conduct network reconnaissance, launch exploits, and more

96
New cards

Distributed Denial of Service (DDoS) Attack

Attacker initiates the attack by exploiting the vulnerabilities in the devices and installing a malicious software in their OS

97
New cards

Rolling Code Attack

Used in keyless endless systems to prevent replay attacks, where an eavesdropper records transmission and replays it at a later time to cause the receiver to unlock

98
New cards

BlueBorne Attack

Performed on Bluetooth connections to gain access and take full control of the target device.

99
New cards

SDR-Based Attacks on IoT

The attacker uses software defined radio (SDR) to examine the communication signals in the IoT network and sends spam content or texts to the interconnected devices

100
New cards

HMI-Based Attacks

Attackers gain access to the HMI systems to cause physical damage to the SCADA devices to collect sensitive information related to critical architecture