Attacks & Vulnerabilities

call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:24 PM on 6/4/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai
Add student to class section state
Add studentsNo students in these sections. Invite them to track progress!

34 Terms

1
New cards

race condition

A malfunction in a preprogrammed sequential access to a shared resource that occurs when multiple processes access the resource simultaneously, leading to unexpected outcomes.

2
New cards

TOC/TOU

Logon session replay attack - A security vulnerability that occurs when a system's state changes between the time a resource is checked and when it is accessed.

3
New cards

cross-site scripting attack

A type of security vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users, potentially compromising user data and session cookies.

4
New cards

Rooting

The process of gaining administrative access to a device, typically an Android system, allowing the user to bypass limitations set by the manufacturer.

5
New cards

Worm

A type of malicious software that replicates itself to spread to other computers, often exploiting vulnerabilities to do so.

6
New cards

bot

A type of malware that connects to a network of compromised devices, often used to perform automated tasks like sending spam or launching DDoS attacks.

7
New cards

Potentially Unwanted Program (PUP)

Software that may be unwanted or harmful to the user, often bundled with legitimate software.

8
New cards

Reflected DDoS

A type of DDoS attack where the attacker sends a request to a third-party server, which then sends a response to the target, amplifying the attack by using legitimate services.

9
New cards

DNS Amplification

A type of DDoS attack that exploits vulnerabilities in DNS servers to flood a target with an overwhelming amount of traffic, significantly amplifying the volume of the original request.

10
New cards

Bluesnarfing

The unauthorized access of information from a Bluetooth-enabled device, typically to obtain sensitive data such as contacts or messages.

11
New cards

IV attack

A type of attack that intercepts and decrypts wireless communications by exploiting vulnerabilities in the Initialization Vector used in WEP encryption.

12
New cards

MITM attack

An on-path cyberattack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

13
New cards

XSS vulnerability

A security flaw that allows attackers to inject malicious scripts into web pages viewed by other users, potentially hijacking user sessions or defacing websites.

14
New cards

CSRF/XSRF attack

A type of attack that tricks a user into executing unwanted actions on a web application in which they're authenticated, often using social engineering techniques to achieve this.

15
New cards

XML Attack

A type of attack that exploits weaknesses in XML processing, often targeting web services and applications to manipulate or compromise their data integrity or availability.

16
New cards

LDAP Injection Attack

A security attack that targets/manipulate directory services, often leading to unauthorized access or data breaches.

17
New cards

Indicators of Compromise (IoC)

Artifacts observed on a network or operating system that indicate a potential intrusion.

18
New cards

cryptomalware

Attacker hopes that the malicious code remains undetected as long as possible so that they can continue to mine cryptocurrency using the victim's device

19
New cards

rootkit

A set of tools used by attackers to gain unauthorized access and maintain control over a computer system without being detected.

20
New cards

Pharming

A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive data.

21
New cards

typosquatting

A harmful practice where attackers register domains with misspellings of well-known websites to deceive users into visiting and potentially compromising their accounts.

22
New cards

pretext

A form of social engineering where an attacker creates a fabricated scenario to gain physical access

23
New cards

watering hole

attacks that compromise users by infecting websites they frequently visit, allowing attackers to target specific groups.

24
New cards

spear phishing

a targeted phishing attack where an attacker customizes their approach to deceive specific individuals or organizations.

25
New cards

fileless malware

Operates only in memory to avoid detection

26
New cards

logic bomb

a piece of malicious code that triggers when specific conditions are met, causing damage or disruption.

27
New cards

Trojan Horse

a type of malware disguised as legitimate software, used to gain access to systems and data.

28
New cards

Research phase

the initial stage of an attack where the threat actor gathers information about the target to plan the attack.

29
New cards

Development phase

the stage of an attack where the threat actor creates or modifies tools and exploits based on the information gathered during the research phase and forms a relationship with the target

30
New cards

Elicitation phase

the stage in which a threat actor collects specific information from the target, often through social engineering or direct interaction.

31
New cards

Exploitation phase

the stage of an attack where the threat actor executes the developed tools or exploits against the target to gain unauthorized access or achieve malicious objectives.

32
New cards

buffer overflow

The act of exploiting a software program's free acceptance of input in order to execute arbitrary code on a target

33
New cards

Covert channel expoitation

The use of timing or storage mechanisms to bypass security controls in order to leak information out of a secured environment.

34
New cards

Evil Twin

A rogue Wi-Fi access point that appears legitimate but is designed to eavesdrop on users' wireless communications.