Lesson 10. Cyber Attack Types and Prevention

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Rogue Access Point Attack

This type of attack involves an unauthorized router being placed within a network by an attacker. This rogue access point often lacks the necessary security configurations, providing an easy entry point for malicious activities like data theft or system disruption.

2
New cards

Evil twin

An Evil Twin attack uses a fake wireless access point that mimics a legitimate one, often in public places like coffee shops. Unsuspecting users connect to the fake network, allowing attackers to intercept their credentials and sensitive information.

3
New cards

Interference(Jamming)

This is a denial-of-service attack where devices, such as microwaves or metal objects, are strategically placed to disrupt wireless network signals. By creating noise and signal blockage, attackers can prevent legitimate users from accessing the network.

4
New cards

War driving

War driving is the practice of using wireless detection equipment while driving around to identify vulnerable wireless networks. Attackers often mark the locations of these networks with chalk to return later and attempt an attack based on the network's security level.

5
New cards

Bluesnarfing

Bluesnarfing is a Bluetooth-based attack where unauthorized access is gained to information stored on a wireless device. Attackers can exploit vulnerabilities in Bluetooth connections to steal data like contacts, messages, and calendar entries without the user's knowledge.

6
New cards

Bluejacking

Bluejacking involves sending unsolicited messages, such as texts, images, or sounds, to nearby Bluetooth-enabled devices. While generally more of a nuisance than a serious threat, it can be used for phishing or to spread misinformation.

7
New cards

Bluebugging

This is a more severe Bluetooth attack that allows an attacker to take complete control of a mobile phone. Once compromised, the attacker can listen to calls, forward calls, send messages, and potentially access other sensitive data on the device.

8
New cards

Cross-Site Scripting (XSS)

In an XSS attack, malicious scripts are injected into websites that are then executed by unsuspecting users in their web browsers. These scripts can be used to create backdoors, steal login credentials, redirect users to malicious sites, or deface websites.

9
New cards

Structured Query Language (SQL) Attack

An SQL injection attack exploits vulnerabilities in web applications that interact with databases. Attackers inject malicious SQL code through input fields to manipulate the database, potentially allowing them to view, modify, or delete data, or even execute commands on the database server.

10
New cards

LDAP injection

This type of attack involves inserting malicious code into LDAP queries to gain unauthorized access to sensitive information stored on an LDAP server. Because it operates at the application layer, it can often bypass traditional

network security measures like firewalls.

11
New cards

XML Injection Attack

XML injection attacks target applications that use XML for data transfer or configuration. By injecting malicious XML code, attackers can manipulate the application's behavior, potentially leading to data theft, modification, or denial of service.

12
New cards

Directory Traversal Attacks (Command Injections)

These attacks exploit vulnerabilities in web servers to access restricted directories and execute commands outside the intended server root. Attackers can inject code into file paths or other input fields to navigate the file system and potentially gain control of the server.

13
New cards

Buffer Overflow

A buffer overflow occurs when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory locations. 1 Attackers can exploit this by carefully crafting input that overwrites critical program data or injects malicious code, allowing them to take control of the system.

14
New cards

Zero Day Exploit

A zero-day exploit is an attack that takes advantage of a previously unknown software vulnerability for which no patch or fix exists. Because there is no known defense, these attacks can be particularly dangerous until the vulnerability is discovered and addressed by the software vendor.

15
New cards

Session (TCP) Hijacking

This attack involves an attacker taking control of an established communication session between two parties on a network. By intercepting session tokens or exploiting vulnerabilities in the TCP/IP protocol, the attacker can impersonate one of the parties and carry out malicious activities.

16
New cards

MAC Filtering and Limiting

MAC filtering is a security measure that uses Media Access Control (MAC) addresses to control which devices are allowed to access a wireless network. By creating an allow list of authorized MAC addresses, network administrators can prevent unauthorized devices from connecting.

17
New cards

802.1X

This is a port-based network access control protocol that provides an authentication mechanism for devices attempting to connect to a LAN or WLAN. It ensures that only authenticated and authorized devices can gain access to the network, preventing rogue devices from operating even if they are physically connected.

18
New cards

Port Security

Port security encompasses both physical and logical measures to protect network ports from unauthorized access. Physically, it involves securing devices in locked cabinets or rooms. Logically, it includes disabling unused ports in the BIOS or network device configurations to reduce potential attack vectors.