Cybersecurity 2 Midterm
General Unix File System Layout
- /etc/passwd
Stores plaintext user information (user ID, group ID, home directory, default shell).
- /etc/shadow
Stores encrypted passwords for users - only root can access.
- /etc/group
Stores basic information about groups.
- chown
Change owner of a file or directory.
- chmod
Change read, write, and execute permissions.
- chgrp
Change group ownership of a file or directory.
Cybersecurity Attacks
- Reconnaissance Attack
Attackers gather information about a target system or network before launching more advanced attacks.
- Sniffing Attack
An attacker intercepts and analyzes network traffic to steal sensitive information such as passwords or data.
- Man-in-the-Middle Attack
Attackers secretly intercept and alter the communication between two parties.
- Password Attack
Unauthorized access using techniques like brute force, dictionary attacks, or credential stuffing to crack passwords.
- Privilege Escalation Attack
Attackers gain elevated privileges on a system, such as root or admin access.
- DNS Poisoning Attack
Attackers corrupt DNS data to redirect users to malicious sites or systems.
- ARP Poisoning Attack
Attackers send fake ARP messages to associate their MAC address with the IP address of another device, enabling eavesdropping or packet interception.
- DHCP Starvation Attack
An attacker exhausts the available IP addresses by flooding the DHCP server with bogus requests, preventing legitimate users from obtaining an IP address.
- DHCP Spoofing Attack
Attackers set up a rogue DHCP server to assign malicious IP settings to users.
- MAC Spoofing Attack
Attackers alter their device's MAC address to impersonate another device on the network.
- Network-based Denial of Service Attack
An attack that floods a network with excessive traffic, making it unavailable for legitimate users.
- Distributed Denial of Service Attack (DDoS)
Attackers use multiple systems to flood a network or service, overwhelming it and causing downtime.
- Malware Attack
Attackers install malicious software, such as viruses, trojans, or ransomware, to damage or gain unauthorized access to a system.
- Advanced Persistent Threat (APT)
A sophisticated and continuous hacking process where attackers gain access to a system and remain undetected for a long period to steal sensitive information.
- SQL Injection Attack
Attackers exploit vulnerabilities in web applications by injecting malicious SQL code into queries, allowing unauthorized access to databases.
- Cross-Site Scripting (XSS) Attack
Attackers inject malicious scripts into web pages viewed by users, which can steal session cookies or other sensitive information.
- Parameter Tampering Attack
Attackers manipulate parameters exchanged between the client and server to modify data or gain unauthorized privileges.
- Directory Traversal Attack
Attackers access restricted directories and execute commands outside the web server’s root directory.
- Cross-Site Request Forgery Attack (CSRF)
Attackers trick users into executing unwanted actions on a web application in which they are authenticated.
- Application-Level DOS Attack
A denial of service attack targeting the application layer, disrupting services by overloading application resources.
- Session Hijacking Attack
Attackers take control of a user session by stealing or predicting session tokens, allowing unauthorized access.
Bluetooth and Wireless Attacks
- Bluesnarfing
Attackers steal data from a Bluetooth-enabled device without the user's permission.
- Bluebugging
Attackers exploit Bluetooth vulnerabilities to take control of a device and remotely execute commands.
- War Driving
Attackers drive around with Wi-Fi-enabled laptops to detect open wireless networks.
- Client Misassociation
An attacker sets up a rogue access point (AP) outside the corporate perimeter and tricks employees into connecting to it.
- Unauthorized Association
Attackers infect a victim machine and activate rogue access points to provide an unauthorized connection to the enterprise network.
- Honeypot Access Point Attack
Attackers use fake access points to trap unsuspecting users and steal sensitive information.
- Rogue Access Point Attack
Rogue wireless access points placed in an 802.11 network can hijack the connections of legitimate network users.
- Misconfigured Access Point Attack
Poorly configured access points allow intruders to steal the SSID and gain access to the network.
- Ad Hoc Connection Attack
Wi-Fi clients communicate directly in ad hoc mode, bypassing access points and exposing the network to unauthorized access.
- AP MAC Spoofing
A hacker spoofs the MAC address of a WLAN client’s equipment to act as an authorized client, eavesdropping on the traffic.
- Denial-of-Service Attack
Wireless DoS attacks disrupt network connections by sending broadcast "de-authenticate" commands.
- WPA-PSK Cracking
Attackers sniff and capture authentication packets and brute force the WPA-PSK key.
- RADIUS Replay
Attackers replay valid RADIUS server responses, authenticating without valid credentials.
- MAC Spoofing Attack
An attacker spoofs the MAC of a client and attempts to authenticate to the AP, leading to unauthorized network access.
- WEP Cracking
Attackers sniff and capture packets, running a WEP cracking program to obtain the WEP key.
- Man-in-the-Middle Attack
Attackers deploy a rogue AP and spoof the client's MAC address to intercept communications between the AP and the client.
- Fragmentation Attack
Attackers obtain 1500 bytes of a pseudo-random generation algorithm (PRGA) to forge WEP packets used for injection attacks.
- Jamming Signal Attack
Attackers use high-gain amplifiers to flood an area with signal interference, disrupting the legitimate AP.
Supply Chain Attack Prevention
- Supply Chain Attack
Attackers compromise a system by exploiting weaknesses in third-party hardware, software, or services.
- Preventing Supply Chain Attacks
Key strategies include vendor assessment, secure communication, code review, digitally signed updates, privileged access management, and adopting zero-trust architectures.