Security + Professor Messer & Cyber

studied byStudied by 15 people
5.0(1)
Get a hint
Hint

Social engineering principles

1 / 489

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

490 Terms

1

Social engineering principles

- Authority - pretending (CEO or Police) or knowing the CEO so do it or else

- Intimidation (Bad things will happen like payroll will fail)

-Consensus/Social Proof - they try to convince based on what's normally expected, a coworker did it for them last week

- Scarcity/Urgency (quantity) - time will expire, needs to happen now (creates Panic) - "buy now before the deal is over"

- Familiarity - know common people

- Trust - Pretending the attacker is from IT please click perform these steps

- Urgency - Time sensitivity that demand immediate action

Reciprocity - doing something in hopes to get something in return

Liking - Being likable so someone will do something for you

Commitment/Consistency - manipulate someone by making their requests seem consistent with what the person has done in the past.

New cards
2

CIA Triad

Confidentiality, Integrity, Availability

New cards
3

Organization data

- Product Information

- Employee Records

- Financial records

- Company private data

- Customer Information

New cards
4

Personal data

- family pictures and videos

- Health Records

- Social Security Number

- email and mail address

New cards
5

Phishing

- An email tricking you to click on malicious links/attachments or asking to provide personal information

- sent in bulk, not targeting individuals

(click here to update your payment details)

(click here to claim a prize)

New cards
6

Phishing Prevention

- Security awareness training

- software to prevent users from receiving phishing emails

- Don't be fooled by typos (check the URL)

- Usually, there's something not quite right (incorrect spelling, fonts, graphics)

- Go to the website directly

- check email headers

- Use MFA for credentials

- only login to trusted sites

New cards
7

SMishing (SMS Phishing)

Phishing messages using text messages

Forwards links and asks for personal information

- check the random information

- check for incorrect spelling

- check for incorrect URLs

- go to the site directly

New cards
8

Vishing (voice phishing)

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

- Caller ID spoofing

- Fake security checks or bank updates

- requesting personal information or access to your PC

How to Prevent:

- Service providers/third party tools will automatically block spam calls

- join do not call lists

- ignore them let them go to VM

- hang up

New cards
9

Typosquatting/URL hijacking

Websites with names similar to real websites; users making typographical errors are sent to a site filled with malware.

www.facebok.com or www.ffacebook.com

- the attacker can sell the misspelt domain to the company

- the attacker can sell the misspelt domain to a competitor so they can redirect traffic to the competitor's site

- the attacker can make money by putting ads on the site

- Phishing site - downloads malicious software when you visit the site

New cards
10

Pharming

Reroutes requests for legitimate websites to false websites, a hacker poisons a DNS server to redirect requests to a false website

- Difficult to know that you are being phished

- Hard for anti-malware software to stop

Defend against pharming

- don't use the default DNS settings use (openDNS/Google)

- check the padlock icon in the browser URL (certificates) it will alert when the site is not secure

- don't enter sensitive info into sites that look odd.

- check default router credentials (hackers could login to change DNS settings)

- enable MFA on your credentials

- keep browsers up to date (Patched)

New cards
11

Spear phishing

- Phishing with inside information (makes the attack more believable. targeting a certain person or group

New cards
12

Whaling attack

- attacking the CEO, officials or high-level executives with a phishing attack

New cards
13

Pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual

"Hi we are calling from Visa regarding your account"

New cards
14

Prepending

Influencing the subject before an event occurs adding words to a malicious file like "SAFE" to gain interest in opening

Using social media mentions (hash tags) to increase visibility or a post

New cards
15

Eliciting Information

encouraging/extracting information using casual conversation

Bracketing - using both high and low estimates to get a specific number from someone (how much did you make last year 80,000? and person may correct you with the accurate amount)

Can you top this - play on the fact that some people like to show off, you can share an extreme story to see if they will better it

Confidential Bait - Pretend to share confidential information which makes the other person feel like they can also share something confidential

New cards
16

identity fraud

your personal information is used to make purchases, withdraw cash, or set up new accounts, receive government benefits without your approval.

New cards
17

Impersonation

- pretending to be someone they are not

- attack the victim as someone higher in rank (CEO, IT)

- Throw tons of technical details around

- pretending to know someone familiar

- talk about common interests (Sports or News Trends)

New cards
18

How to protect against impersonation

- Never volunteer information

- Don't disclose personal detail

- Always verify before revealing info

- Verification should be encouraged

New cards
19

Dumpster diving

- Mobile garbage bin

- Important Information thrown out with the trash

- Gather details that can be used for a different

- Timing is important

- Dumpster diving can be legal if not locked up

- fence and lock trash cans

- shred/burn documents

- Examine trash for sensitive information

New cards
20

Shoulder surfing

- obtaining information by observing someone as they view or enter information

- webcam monitoring, Binoculars/ Telecopes, video surveillance

New cards
21

Preventing shoulder surfing

- control your input ( be aware of your surroundings)

- Use privacy filters

- Keep your monitor out of sight

- avoid public Wi-Fi and use MFA

New cards
22

De-hoaxing

- consider the source (don't believe anyone)

- cross reference - check hoax info websites to confirm hoax

- spam filters can help - filters can move to spam folder

- too good to be true it is

New cards
23

Computer hoaxes

Computer hoaxes are false or misleading messages, emails, or online content that are designed to deceive or trick computer users.

- Chain Emails to multiple people

- Social media hoaxes - fake news on social media

- Some hoaxes will take your money (Ask to buy gift cards and send code)

- Fake virus popups to get you to contact a number to click on a link

New cards
24

Watering hole attack

A malicious attack that is directed toward a small group of specific individuals who visit the same/popular website. (Coffee Shop, Financial Website)

hacking a popular website (using a vulnerability), when you go to the site and login or place an order you get infected with Malware

New cards
25

Watching the watering hole

- using VPN to encrypt traffic

- firewalls and IPS ( stop the network traffic before things get bad

- Anti-virus/ Anti- malware signature updates

New cards
26

Spam

unsolicited, unwanted commercial/Non-Commercial email messages or Phishing Attempts

- Security concerns

- Cause resource utilization

- Storage costs

- Software costs (Spam Filter)

New cards
27

SPIM (spam over internet messaging)

A form of spam using instant messaging that targets instant messaging users

New cards
28

Ways to Prevent Spam

- Spam Filter (email or on mail server/gateway)

- Allowed List - only emails from trusted senders are allowed through

- SMTP Standard Checks (RFC Standards) - block emails that don't follow RFC standards

- rDNS (Reverse DNS Lookup) block emails where the sender's domain doesn't match the IP address

- Tarpitting - Intentionally slow down the server conversation on your end or the hackers end so the hacker gives up and moves on

- Recipient Filtering - Block all emails not addressed to a valid recipient's email address

New cards
29

Influence campaigns

Using social engineering to sway attention and sympathy in a particular direction.

- Sway public opinion on political or social views

- the actor creates fake accounts on social media

- the fake users create a post fake content on social media

- real news outlets and real users pick it up because it is popular and they report on it

New cards
30

Influence Campaigns -Hybrid Warfare (Cyberwarfare)

Normally carried out by state actors (governments) to influence the balance of power in a country by using military, political, economic, or civil means, and conceivably running a campaign to spread disinformation.

Used to influence public opinion to start wars or change the opinion of a government

New cards
31

Credential Harvesting (Password Harvesting)

attackers trying to gain access to usernames, passwords, that might be stored on your computer

attackers harvest credentials by using:

- Phishing

- Mailware

- Brute Force

Prevent credential harvesting by:

- not clicking on links and attachments

- use MFA

- keep antivirus/ant-malware up to date

- use proper password management (avoid password re-use)

- dont send credentials over public wifi

New cards
32

Invoice Scams

using fraudulent invoices to steal from a company, typically the attacker knows who pays the bill for the company

The attacker pretends to be someone important in the company

New cards
33

Types of viruses

- Boot sector viruses - takes controls on bootup by infecting the boot sector of the HDD

-- Macro viruses - run in Macros (Common in Microsoft Office)

- Direct Action viruses - attach itself to files and spread when opening

- Resident viruses - embed itself into memory

- Polymorphic Virus - Can modify their code to evade detection

- Web Scripting virus - can exploit a browsers vulnerabilities

New cards
34

Malware

Malware is a type of software that is specifically designed to cause harm to a computer system, network, or device. The term "malware" is a combination of "malicious" and "software,

Defense against Malware:

- Keep anti-virus/anti-malware up to date

- Keep OS and software up to date

- Don't visit shady websites

New cards
35

Malware types

- Viruses - Infects executable files and spreads through a system by self-replicating to other devices. (it must be executed)

- Worm - a self-replicating program that spreads a cross the network, Worms do not need any human intervention to spread

- Trojans - disguises itself as legitimate software, but contains Malware (applications, videos) they are not viruses (only allow software from trusted sources and dont allow users to install software)

- Ransonware (Crypto-Malware) - encrypts files or locks a user out of a system, and demands payment in exchange for restoring access. (backup systems, store backups separately, file auto-versioning, patching, caution with websites & attachments)

Potentially Unwanted Programs (PUP)

- non malicious software

- installs toolbars, ad popups or redirects to other search engines

- Adware: A type of malware that displays unwanted advertisements or pop-ups on a user's screen. Developers get paid per click our view

- Malvertising - Malicious advertising, using ads to spread malware

Spyware - A type of malware that is designed to spy on a user's activity, such as recording keystrokes or taking screenshots.

Rootkits - A type of malware that is designed to hide its presence on a system, often by modifying the operating system. core system files (part of the kernel) - hard to detect and remove

Botnets: A type of malware that infects multiple devices and creates a network of "zombie" computers that can be controlled remotely. used to spread misinformation, create high network traffic, mine crypto and DDos attacks.

Command & Control (C&C) - used to control bots remotely, the connection can be established by a vulnerability or a backdoor

Fileless malware: A type of malware that operates entirely in memory, leaving no traces on the victim's hard drive and making it more difficult to detect and remove.

Backdoors - allows attackers back into a system after they gain access, they are not always malicious developers create them.

Prevent viruses:

- keep anti-virus/anti-malware software up to date

- don't open files blindly

- be careful what you download from the internet

- watch out for social engineering techniques

- code review

- network monitoring

- firewalls

- user awarenes

New cards
36

Virus vs. Worm

Viruses require some sort of activation, Worms do not

Worms and viruses are designed to self-replicate

Viruses latch on to other software

Worms spread through vulnerabilities

New cards
37

drive-by download

Program which automatically downloads when a user visits a web page, usually without their knowledge or consent.

New cards
38

How you get malware

- a worm finds a vulnerability

- installs malware that includes a remote access backdoor (Bot may be installed later)

- Your computer must run a program (email link, pop-up, drive-by download, worm)

-Vulnerable computer (out of date OS)

New cards
39

Protecting against ransomware

- always have a backup (an offline backup, ideally

- Keep your operating system up to date (Patch those vulnerabilities)

- keep your applications up to date (security patches)

- Keep your anti-virus/anti-malware signatures up to date (new attacks every hour)

New cards
40

Remote Access Trojans (RATs)

a type of malware that allows an attacker to take control of a victim's computer or device from a remote location. The attacker can then use this access to steal data, install additional malware, or use the infected system as a platform for launching further attacks.

- remote Administration Tool (ultimate backdoor, administrative control of a device)

Stealing sensitive data such as login credentials, financial information, or personal files.

Monitoring user activity, including keystrokes, web browsing, and application usage.

Using the victim's computer to launch attacks on other systems, as part of a larger botnet.

as cryptocurrency mining or distributing spam.

New cards
41

Protecting againsts trojans and RATs

- Don't run unknown software or links

- Keep anti-virus/anti-malware signatures updated (there are always new attacks)

- Always have a backup

- Use strong passwords

- Be cautious when allowing remote access to others

New cards
42

Easter egg

Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature

New cards
43

Zeus/Zbot malware

botnet malware used to clean out bank accounts.

commonly combined with Necurs rootkit for hard detection and removal.

New cards
44

Finding and removing rootkits

- Anti-malware scans/up to date

- have backups to restore your system

- use a specific remover

- Secure boot with UEFI (security in the BIOS)

New cards
45

Keyloggers

a type of software or hardware device that records every keystroke made on a computer or other device

Keyloggers can be installed on a device in a number of ways, including as part of a malware infection, through physical access to the device, or via a remote connection. Once installed, a keylogger can silently record every keystroke made on the device, including passwords, emails, chat conversations, and other sensitive information.

New cards
46

Preventing keyloggers

- Usually installed with malware (Use anti-virus/anti-malware & Keep your signatures updated)

- Block unauthorized communication ( block the exfiltration attempt & Firewall rules/ monitoring)

- Run a keylogging scanner (checks for keylogging activity)

New cards
47

Why is there so much adware and spyware

- Money

- your computer time and bandwidth is incredibly valuable

- Your bank account is incredibly valuable

New cards
48

Protecting against adware/spyware

- Maintain your anti-virus/ anti-malware (always have the latest signatures)

- Always know what you're installing (and watch your options during the installation)

- have a good backup

- Run some scans (Malwarebytes with latest signatures)

- Know what you are installing

New cards
49

Botnets

- Robot networks

- Once your machine is infected, it becomes a bot

- gets on your computer though trojan horse or OS/ application vulnerability

- Botnets are for sale

New cards
50

Stopping a Bonet

- Prevent initial infection (OS and application patches, Antivirus/anti-malware and updating signatures

- Identify an existing infection (On-demand scans and Network monitoring)

- IPS (Intrusion Prevention System) on a firewall from communicating to the C&C

- Security Groups NACL (Network Access Control List)

- Setup monitoring and logging

New cards
51

Bot Herder

An attacker who controls a botnet to launch attacks on other systems

New cards
52

Logic bomb

- Malware that is executed by a set of instructions when specific conditions are met (used by disgruntled employees)

- It can by executed at a certain time (time bomb)

- user event

- Logic bombs are difficult to identify and prevent as they may lie dormant for a longer period of time before being activated

New cards
53

Preventing a logic bomb

- implement strict access controls to a limited number of users

- Log monitoring (alert on changes, host-based intrusion detection, Tripwire, etc)

- constant auditing for changes

- strong password policies

New cards
54

Prevent Password Attacks

- Implement Password Policy (password lengths, deny lists, account lockouts, default password change)

- Use a password managers

- Enforce MFA

New cards
55

Forms of MFA/2FA

Something you are (biometric, face recognition, voice, veins, eyes)

Something you have (smart card, USB token, push SMS, PIN via SMS)

Something you know (password, pin, Security Question)

Somewhere you are (location, IP, geolocation area)

Something you can do (handwriting, typing technique, using patterns)

Something you exhibit - the way you talk, walk, or act

Someone you know - an employee vouching for you, comes down to meet you or your mother's maiden name

Weakest to Strongest:

- Something you know

- Something you have

- Something you are

New cards
56

plain text password

Passwords that are unencrypted and clear

- don't use software that does not support encrypted passwords or update to the latest version that does

New cards
57

Hashing Passwords

- Hashes represent data as a fixed-length string or text

- Will not have a collision

- different inputs will not have the same hash

- a hash is a one-way trip, it cannot be recovered (cannot remove the hash back to plain text)

- Use a hash to provide integrity

- Can be used to create digital signature

New cards
58

Hashes vs Encryption

Encryption - Secures confidential data (sending a password securely over HTTPS)

Hashing - protects the integrity of the information (storing the password in a database)

Hashing is a fixed length, all passwords will have the same hash length

Encryption uses variable lengths, passwords that are encrypted will be different lengths

Encryption a two-way function what is encrypted can be decrypted

Hashing - a one-way function that scrambles plain text, it cannot be reversed,

New cards
59

Spray Attack (Password Spraying)

- Type of Brute Force attack which tries common passwords

hackers will only try a few before stopping so they dont lock the account out

Prevent:

using MFA, Capcha, and force passwords to change at first login

New cards
60

Brute Force Attack - Online

the password cracker tries every possible combination of characters until the hash is matched

- Brute Force Attacks are ONLINE

- Keep trying the login process

- they are very slow and they lock out accounts

New cards
61

Brute Force Attack - Offline

- Takes the password database offline to crack the hashes

- It will not lockout accounts

- use powerful GPUs to crack the hashes quickly

New cards
62

Brute Force Attack - Dictionary Attack

Try common words from a dictionary as a password

- the cracker will try common numbers that replace letters (0 instead of O)

- use powerful GPUs to crack the hashes quickly

- use MFA

- limit number of login attempts

- reset password after a certain number of failed attempts

New cards
63

Credential Stuffing

Brute force attack in which stolen user account names and passwords are tested against multiple websites.

to defend against credential stuffing:

- Enforce MFA

- Add a pin, secondary password or security question

- Check user passwords against know leaked passwords

New cards
64

Rainbow Table

A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file.

- you need different rainbow table for each application/Operating System as they are not the same

New cards
65

Salt

Adding extra data to the beginning or the end of a hash so it is harder to crack

- Prevents Rainbow Tables as the hashes will always be different

New cards
66

Types of Physical Attacks

Malicious USB Cable - additional electronics inside the cable that will act as a HID (Human Interface Device) to allow the hacker to type or use the mouse, the hacker can open CMD and install malicious software

- dont use random cables

- keep systems up to date

- dont leave visitors alone

- use up to date anti virus

Malicious Flash Drive - additional electronics inside the drive that could run malicious software, hackers will leave them lying round to see if users will connect the drive and run the file

- dont use random flash drives

- keep systems up to date

- dont leave visitors alone

- use up to date anti virus

Skimming - stealing information from your card when you insert it into a pin pad or ATM, it will copy the stripe information.

(dont use tampered machines, use reputable stores, use credit instead of credit, check your bank statements)

Card Cloning - cloning a credit card including the CVC number or Gift Cards, when the GC is activated the hacker will use their card to take the funds from the legitimate GC

Tailgating - following an authorized person into a secure area

Shoulder surfing - looking over a user's shoulder while they are entering sensitive information

Power surge attacks: Attackers can damage or destroy electronic devices by sending a high voltage surge of electricity to the device.

Jamming: This involves disrupting wireless signals or electronic communications by broadcasting high-powered signals on the same frequency.

New cards
67

Machine Learning

A type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.

New cards
68

Poisoning Machine Learning

Confuse the AI (Data Poisoning)- attackers send modified training data that causes the AI to behave incorrectly

New cards
69

AI Evasion attacks

Used to evade detection or mislead AI models, such as machine learning algorithms, by manipulating or changing the input data

Changing inputs to mess with AI machine learning.

New cards
70

Protect AI Evasion Attacks

- Secure the learning algorithms

- implement adversarial training

- Regular testing and auditing

New cards
71

Artificial Intelligence vs Machine Learning vs Deep Learning

Artificial Intelligence - focuses on accomplishing "smart" tasks combining machine learning and deep learning to emulate human intelligence

Machine Learning - a subset of AI, that uses algorithms to learn from data

Deep Learning - a subset of machine learning concerned with algorithms inspired by structure and function of the brain called Artificial Neural Networks

New cards
72

Supply-chain attack (Island Hoping)

A cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain. (third party vendors/suppliers) IE Solarwinds Attack

How to Defend:

- Maintain a secure and up-to-date infrastructure

- Build a secure software update process

- restrict access to systems

- only allow authorized applications to run

- develop incident response processes

- use end-point detection (EDR)

New cards
73

Cloud-based attacks vs On-premises Attacks

Cloud-based attacks - Data center is often more secure and less vulnerable to disruptive attacks (like DDoS) On the downside, you will not have facility-level or physical system-level audit access.

On-premises Attacks - You do not benefit from the cloud's shared responsibility model. You have more control but are responsible for security of the full stack.

Org has to defend a wider range of attacks and greater expense and effort to defend against them.

New cards
74

Cloud-based vs. on-premises Deployments

Cloud based Pros:

- centralized

- costs less

- no data center

- automated signature and security updates

- Limited down times

- no hardware purchases

- provider provides physical security

- build systems quickly (one click)

Cloud based Cons:

- users must be trained on best security practices using the cloud

- more vulnerable to disruptive attacks

- Must have a internet connection

- Relying on a third party

- uncontrolled down time

- third parties could gain access

- cloud share responsibility (who is responsible if breached)

On-premises Pros:

- You have full control of your data

- on-site IT can manage security better

- you can maintain uptime and availability.

- more secure and less vulnerable

On-premises Cons:

- It puts the security burden on the client

- incurring the cost of having a fully staffed security team and renting a data center

- changes take a while, planning, ordering hardware

- you are responsible for the infrastructure

New cards
75

Cryptographic Attacks

- Birthday: - the probability of multiple of finding 2 inputs that have the same Hash value (prevent by using long hashes)

- Collision: - used with MD5 hash receiving the same hash even though the plaintext passwords are different (use collision-resistant hashes)

- Downgrade: - Force the system to downgrade the encryption so they can downgrade the security (TLS 1.2 to TLS 1.0) or downgrade from HTTPS to HTTP

- Brute Force - attacker tries every possible password

- Dictionary - use common words or phrases on a dictionary to guess a password

- Replay - attacker captures or eavesdrop network packets and replays them to gain access (credentials or sessions) (prevent by using date and time stamps)

Known plaintext attack: This type of attack involves analyzing the encrypted ciphertext and the corresponding plaintext to figure out the secret key.

- Side-Channel - using exploits in a cryptographic system, such as the power consumption or electromagnetic radiation, to gain access to the encryption key.

New cards
76

How to stop tailgating

- Policy for visitors (you should be identify anyone or have an escort)

- one scan, one person ( A matter of policy or mechanically required

-Mantrap/ Airlock

- don't be afraid to ask (Who are you and why are you here)

New cards
77

Privilege Escalation

- Gain higher-level access to a system

- Higher-level access means more capabilities

- These are high-priority vulnerability patches

- Horizontal privilege escalation - user A can access user B

Vertical privilege escalation - user moving from low level privileges to high level privileges

New cards
78

Mitigating privilege escalation

• Patch quickly - fix the vulnerability

• Updated anti-virus/anti-malware software - Block known vulnerabilities

• Data Execution Prevention - Only data in executable areas can run

- regularly check system configurations

- implement strong access controls/password policies

- provide "Least Privilege" access

New cards
79

Improper Error Handling

Software errors that provide too much information that an attacker can use to gain access.

Proper error handling to avoid errors from displaying:

- Stack traces

- Database dumps

- Memory dumps

- Network information

New cards
80

Cross-Site Scripting (XSS)

- an attacker injects malicious script into a web page viewed by other users.

- The injected code is typically in the form of a script that executes when a user visits the infected web page, allowing the attacker to steal sensitive information or perform other malicious actions.

Prevent:

- input validation and filtering

- validate data length and data types

New cards
81

Non-persistent (reflected) XSS attack

an attacker injects malicious code into a URL or form field (Search Box) that is then reflected back to the user in the page response.

Bad guy may email a link

- Email link runs a script that sends credentials/session IDs/cookies to the bad guy

- Script embedded in URL executes in the victim's browser, as if it came from the server

- Bad guys use credentials/session IDs/cookies to steal victim's information without their knowledge

New cards
82

Persistent (stored) XSS attack

an attacker injects malicious code into a web page that is then permanently stored on the web server and served to all users who access that page.

- Bad guy posts a message to a social network that includes a malicious payload (it's now "persistent")

- Everyone gets the payload

- No specific target

- For social networking, this can spread quickly

- Everyone who views the message can have it posted to their page, where someone else can view it and propagate it further.

New cards
83

Protecting against XSS

Be careful when clicking untrusted links • Never blindly click in your email inbox. Never.

• Consider disabling JavaScript • Or control with an extension This offers limited protection

Keep your browser and applications updated • Avoid the nasty browser vulnerabilities

Validate input • Don't allow users to add their own scripts to an input field

Use HTTPS encryption

Implement Consent Security Policy (CSP)

Use browser extensions that block XSS attacks

New cards
84

SQL Injection

SQL injection involves exploiting vulnerabilities in a web application's code to execute unauthorized access to a SQL database

Prevent:

Input validation, user prepared statements and limit account privileges

New cards
85

Code Injection

A method used by hackers to insert malicious code into legitimate files or data transmissions and applications.

New cards
86

XML injection

Is a type of security vulnerability that occurs when an attacker is able to manipulate or inject malicious content into an XML document or XML application to gain unauthorized access

The best defense is to filter the user's input and sanitize it to make certain that it does not cause XPath to return more data than it should.

New cards
87

LDAP injection

Lightweight directory access protocol (LDAP) injection is a type of security vulnerability that occurs when an attacker is able to manipulate or inject malicious input into an LDAP query or command.

Modify LDAP requests to manipulate application results

https://example.com/searchusers?user=*

<p>Lightweight directory access protocol (LDAP) injection is a type of security vulnerability that occurs when an attacker is able to manipulate or inject malicious input into an LDAP query or command.</p><p>Modify LDAP requests to manipulate application results</p><p>https://example.com/searchusers?user=*</p>
New cards
88

DLL injection

An attack that injects a malicious Dynamic Link Library (DLL) into memory and runs it. Attackers rewrite DLL, inserting malicious code

New cards
89

XML External Entities (XXE)

exploit: a vulnerability that occurs when an web application processes XML input from an untrusted source without proper validation or mitigation measures.

- Attackers could gain access to files on a application server

- Perform DOS attacks

- Gain backdoor access to systems

- used to perform server-side request forgery (SSRF)

prevent:

- Replace XML with JSON or YAML

- patch and update

- perform security testing

<p>exploit: a vulnerability that occurs when an web application processes XML input from an untrusted source without proper validation or mitigation measures.</p><p>- Attackers could gain access to files on a application server</p><p>- Perform DOS attacks</p><p>- Gain backdoor access to systems</p><p>- used to perform server-side request forgery (SSRF)</p><p>prevent:</p><p>- Replace XML with JSON or YAML</p><p>- patch and update</p><p>- perform security testing</p>
New cards
90

Buffer Overflow

A technique for crashing a system by sending too much data to the buffer in a computer's memory, and exceeds the size of the buffer. This can cause the data to spill over into adjacent memory locations, corrupting or overwriting data that may be used by the program or the operating system.

- Developers need to perform bounds checking so sections of memory cannot be overwritten (input validation)

New cards
91

Replay Attack

A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain

unauthorized access to a network.

Defend against Replay Attacks:

- Use time limits (Kerberos)

- use one-time passwords

- Nonce - Code that can only be used once and/or expires after a period of time

New cards
92

Session Replay

An attack in which an attacker attempts to impersonate a user by stealing a valid session and reuses it

Defend against session replays - disallow session ID reuse in web apps

New cards
93

Pass the Hash Attack

a method used by attackers to gain unauthorized access to a system by using the hashed password of a user without knowing the actual plaintext password.

This is possible because the hash is a representation of the password that can be used for authentication purposes.

Defend against pass the hash:

- use least privileges

New cards
94

Cookies

• Information stored on your computer by the browser

• Used for tracking, personalization, session management

- Could be considered be a privacy risk

-Session IDs are often stored in the cookie

New cards
95

Session Hijacking (Sidejacking)

When an attacker gains access to a active session ID and uses the ID to pose as the victim without needing a username or password/ fix by encrypting connection

New cards
96

Prevent session hijacking

- Encrypt end-to-end (HTTPS) - so they cannot capture your session ID

- Encrypt end-to-somewhere - use a VPN

- Use session ID monitors

New cards
97

Header Manipulation

Altering the headers of a packet to bypass security controls or deceive a system into accepting or processing a packet in an unintended way.

an attacker can modify the header fields to include false or misleading information, such as changing the source IP address to make it look like the packet is coming from a trusted network, or altering the protocol field to trick the system into processing the packet in an unintended way.

New cards
98

Cross-Site Request Forgery (CSRF or XSRF)

an attacker tricks a user's web browser into performing unintended actions on a trusted website

IE: you login to your bank which creates a session cookie, you visit a malicious site that will take that session to access your banking site without your knowledge

Prevent CSRF:

- use CSRF tokens and check the referring URL to ensure it came from the local site

New cards
99

Server-Side Request Forgery (SSRF)

When an attacker exploits a vulnerable web application to have a web server perform a request on behalf of the attacker

In an SSRF attack, the attacker sends a request to a vulnerable web application, which then executes the request on the server-side without properly validating the input parameters.

The attacker can exploit this vulnerability to perform various malicious activities, such as scanning internal networks, accessing sensitive files, or attacking other vulnerable applications that are not accessible directly from the internet.

Prevent SSRF:

- never trust user inputs

New cards
100

Driver Manipulation

A software attack where the attacker rewrites or replaces the legitimate device driver or application programming interface (API) to enable malicious activity to be performed

New cards

Explore top notes

note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 27 people
... ago
5.0(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 84 people
... ago
4.5(2)
note Note
studied byStudied by 38 people
... ago
5.0(1)
note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 11 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (21)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 57 people
... ago
5.0(2)
flashcards Flashcard (71)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 9 people
... ago
5.0(3)
flashcards Flashcard (109)
studied byStudied by 20 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 8 people
... ago
5.0(3)
robot