Cybersecurity 2 Midterm

General Unix File System Layout

- /etc/passwd

Stores plaintext user information (user ID, group ID, home directory, default shell).

- /etc/shadow

Stores encrypted passwords for users - only root can access.

- /etc/group

Stores basic information about groups.

- chown

Change owner of a file or directory.

- chmod

Change read, write, and execute permissions.

- chgrp

Change group ownership of a file or directory.

Cybersecurity Attacks

- Reconnaissance Attack

Attackers gather information about a target system or network before launching more advanced attacks.

- Sniffing Attack

An attacker intercepts and analyzes network traffic to steal sensitive information such as passwords or data.

- Man-in-the-Middle Attack

Attackers secretly intercept and alter the communication between two parties.

- Password Attack

Unauthorized access using techniques like brute force, dictionary attacks, or credential stuffing to crack passwords.

- Privilege Escalation Attack

Attackers gain elevated privileges on a system, such as root or admin access.

- DNS Poisoning Attack

Attackers corrupt DNS data to redirect users to malicious sites or systems.

- ARP Poisoning Attack

Attackers send fake ARP messages to associate their MAC address with the IP address of another device, enabling eavesdropping or packet interception.

- DHCP Starvation Attack

An attacker exhausts the available IP addresses by flooding the DHCP server with bogus requests, preventing legitimate users from obtaining an IP address.

- DHCP Spoofing Attack

Attackers set up a rogue DHCP server to assign malicious IP settings to users.

- MAC Spoofing Attack

Attackers alter their device's MAC address to impersonate another device on the network.

- Network-based Denial of Service Attack

An attack that floods a network with excessive traffic, making it unavailable for legitimate users.

- Distributed Denial of Service Attack (DDoS)

Attackers use multiple systems to flood a network or service, overwhelming it and causing downtime.

- Malware Attack

Attackers install malicious software, such as viruses, trojans, or ransomware, to damage or gain unauthorized access to a system.

- Advanced Persistent Threat (APT)

A sophisticated and continuous hacking process where attackers gain access to a system and remain undetected for a long period to steal sensitive information.

- SQL Injection Attack

Attackers exploit vulnerabilities in web applications by injecting malicious SQL code into queries, allowing unauthorized access to databases.

- Cross-Site Scripting (XSS) Attack

Attackers inject malicious scripts into web pages viewed by users, which can steal session cookies or other sensitive information.

- Parameter Tampering Attack

Attackers manipulate parameters exchanged between the client and server to modify data or gain unauthorized privileges.

- Directory Traversal Attack

Attackers access restricted directories and execute commands outside the web server’s root directory.

- Cross-Site Request Forgery Attack (CSRF)

Attackers trick users into executing unwanted actions on a web application in which they are authenticated.

- Application-Level DOS Attack

A denial of service attack targeting the application layer, disrupting services by overloading application resources.

- Session Hijacking Attack

Attackers take control of a user session by stealing or predicting session tokens, allowing unauthorized access.

Bluetooth and Wireless Attacks

- Bluesnarfing

Attackers steal data from a Bluetooth-enabled device without the user's permission.

- Bluebugging

Attackers exploit Bluetooth vulnerabilities to take control of a device and remotely execute commands.

- War Driving

Attackers drive around with Wi-Fi-enabled laptops to detect open wireless networks.

- Client Misassociation

An attacker sets up a rogue access point (AP) outside the corporate perimeter and tricks employees into connecting to it.

- Unauthorized Association

Attackers infect a victim machine and activate rogue access points to provide an unauthorized connection to the enterprise network.

- Honeypot Access Point Attack

Attackers use fake access points to trap unsuspecting users and steal sensitive information.

- Rogue Access Point Attack

Rogue wireless access points placed in an 802.11 network can hijack the connections of legitimate network users.

- Misconfigured Access Point Attack

Poorly configured access points allow intruders to steal the SSID and gain access to the network.

- Ad Hoc Connection Attack

Wi-Fi clients communicate directly in ad hoc mode, bypassing access points and exposing the network to unauthorized access.

- AP MAC Spoofing

A hacker spoofs the MAC address of a WLAN client’s equipment to act as an authorized client, eavesdropping on the traffic.

- Denial-of-Service Attack

Wireless DoS attacks disrupt network connections by sending broadcast "de-authenticate" commands.

- WPA-PSK Cracking

Attackers sniff and capture authentication packets and brute force the WPA-PSK key.

- RADIUS Replay

Attackers replay valid RADIUS server responses, authenticating without valid credentials.

- MAC Spoofing Attack

An attacker spoofs the MAC of a client and attempts to authenticate to the AP, leading to unauthorized network access.

- WEP Cracking

Attackers sniff and capture packets, running a WEP cracking program to obtain the WEP key.

- Man-in-the-Middle Attack

Attackers deploy a rogue AP and spoof the client's MAC address to intercept communications between the AP and the client.

- Fragmentation Attack

Attackers obtain 1500 bytes of a pseudo-random generation algorithm (PRGA) to forge WEP packets used for injection attacks.

- Jamming Signal Attack

Attackers use high-gain amplifiers to flood an area with signal interference, disrupting the legitimate AP.

Supply Chain Attack Prevention

- Supply Chain Attack

Attackers compromise a system by exploiting weaknesses in third-party hardware, software, or services.

- Preventing Supply Chain Attacks

Key strategies include vendor assessment, secure communication, code review, digitally signed updates, privileged access management, and adopting zero-trust architectures.