CompTIA Security+ Attack Types and Terms!!

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Phishing

: In This attack, the attacker sends an email that seems to come from a respected bank or other financial institution, claiming that the recipient needs to provide an account number, Social Security number, or other private information to the sender in order to verify an account

Grey Hat

A Hacker that may sometimes violate laws or act immorally, but doesn't have the same malicious intents as a Black Hat

Injection

A broad field of attacks involving a hacker forcing additional input into a program, which is then processed by a user

SPIM

A form of SPAM that is sent via instant messaging

Black Hat

A hacker that discovers and exposes security flaws for personal gain or malicious intent

White Hat

A hacker that discovers and exposes security flaws with the permission of the manufacturer/company

Dumpster Diving

A human-based attack where the goal is to reclaim important information by inspecting the contents of trash containers

Spear Phishing

A phishing technique when attackers target a specific individual or institution

Trojan

A program disguised as a harmless application (or attached to a harmless program) that carries its own hidden, malicious payload

Worm

A self-propagating computer virus often design to cripple network bandwidth

RAT (Remote Access Trojan)

A specialized trojan that gives the attacker complete control of a system, as if it were a legitimate remote control program

Domain Hijacking

A type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking

Social Engineering

A verbal attack meant to bypass technical security by tricking a target into giving away information

Polymorphic Virus

A virus that constantly changes its signature every time it infects a new file

Zero Day

A vulnerability is one that a malicious user is able to exploit before the vulnerability is publicly known or known to the developers, and before those developers have a chance to issue a fix

Cross-site scripting (XSS) Attack

A web application attack that is directed toward sites with dynamic content. This is done by introducing malicious scripts into a trusted website. Since the website is trusted, the victim's browser grants the script the same permissions as the rest of site, and its malicious code is able to run. XSS attacks are similar to watering hole attacks

Cross-Site Forgery Request (CSFR)

A web application attack that takes advantage of the trust established between an authorized user of a website and the website itself. This type of attack exploits a web browser's trust in a user's unexpired browser cookies

Buffer Overflow

An attack in which data goes past the boundary of the destination buffer and begins to corrupt adjacent memory. This causes an app to crash or reboot, and may execute rogue code on a system or result in loss of data

Threat Actor

An entity that is partially or wholly responsible for an incident that affects (or has potential to affect) and organization's security

Rootkit

Code intended to take control of a system at the lowest levels. These forms of malware often install back doors and other malicious code

Brute Force

In this attack, the attacker tries to enter a succession of passwords, using the same interface as the target user application. This type of attack is susceptible to security settings that limit the number of failed password attempts allowed by an application or an operating system

SNMP Attack

MFPs (MultiFunction Printer)have backdoor administrator access. Attackers can access through a default password by SNMP (simple network management protocol), since it is stored in the SNMP variable from where anyone can access if they know location of variable or address of the MFP. Structure of the network can be obtained through just sniffing the SNMP traffic.

Piggy Backing

Similar to tailgating, this is a situation where the attacker enters a secure area with an employee's permission

Session Hijacking

The attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services. One such exploit involves stealing an active session cookie that is used to authenticate a user to a remote server and then using that cookie to control the session thereafter

Clickjacking

The attacker hides links under other web page elements so that victims will unintentionally select the hidden links

URL hijacking (Typo Squatting)

The attacker registers domain names that closely resemble the names of legitimate websites, to take advantage of the possibility of the domain name being mistyped into a browser

Dictionary attack

This attack type automates password guessing by comparing passwords against a predetermined list of possible password values, like words in a dictionary

Birthday Attack

This attack type exploits weaknesses in the mathematical algorithms used to generate hashes. This type of attack takes advantage of the probability of different inputs producing the same encrypted outputs, given a large enough set of inputs. It is named after the surprising statistical fact that there is a 50 percent chance that two people in a group of 23 will share a birthday

Tailgating

This is a human-based attack where the attacker enters a secure area by following a legitimate employee without the employee's knowledge or permission

Shoulder Surfing

This is an attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN

Grey Box Testing

This refers to a situation where the tester has partial knowledge of internal architectures and systems, or other preliminary information about the system being tested. This type of test requires partial reconnaissance on the part of the tester. These tests are useful for simulating the behavior of an unprivileged insider threat

Black Box Test

This refers to a situation where the tester is given no specific information about the structure of the system being tested. The tester may know what a system does, but not how it does it. This type of test would require the tester to perform the reconnaissance phase

White Box Testing

This refers to a situation where the tester knows about all aspects of the system and understands the function and design of the system before the test is conducted. This type of test is sometimes conducted as a follow-up

SPAM

Unsolicited emails that carry unwarranted advertisements, malware or viruses

Penetration testing ("Pen testing")

Uses active tools and security utilities to evaluate security by simulating an attack on a system. This test will verify that a threat exists, then will actively test and bypass security controls. If authorized, it will also exploit vulnerabilities on the system

Bluesnarfing

a method in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection within the 328-foot Bluetooth transmission limit

Bluejacking

a method used by attackers to send out unwanted Bluetooth signals from smartphones, mobile phones, tablets, and laptops to other Bluetooth-enabled devices

Amplification

a network-based attack where the attacker dramatically increases the bandwidth sent to a victim during a DDoS attack

Pass the Hash Attack

a network-based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to the same network the hashed credentials originated on. By resending hashed credentials, the attacker does not need to expend any effort in cracking any passwords. Normally directed at Windows-based systems, pass the hash attacks take advantage of the use of single sign-on (SSO) in authentication protocols such as NTLM and Kerberos

Botnet

a set of computers that has been infected by a control program called a bot that enables attackers to collectively exploit those computers to mount attacks.

Rainbow Table Attack

a type of hacking wherein the perpetrator tries to use a rainbow hash table to crack the passwords stored in a database system

Disassociation Attack

a type of wireless attack where an attacker sends a spoofed disassociation frame to the target device, so that the frame appears to originate from the WAP. This causes the target device to attempt to re-associate with the WAP. By continuing to send the disassociation frames, the attacker can cause a DoS

Rogue AP

a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator

ARP Poisoning Attack

also known as ARP spoofing, occurs when an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient

Evil Twin

an access point on a wireless network that fools users into believing it is legitimate

Jamming

an attack in which radio waves disrupt 802.11 wireless signals

WPS Attack

an attack that applies a type of brute force attack in conjunction with the wireless protected setup feature of most routers

NFC Attack

an attack that exploits the NFC technology by utilizing specifically configured antennas to steal data

RFID Attack

an exploit that takes advantage of the RFID technologies ability to transfer data between a transmitter and receiver

Packet Sniffing

can be used as an attack on wireless networks where an attacker uses a protocol analyzer to capture data and register data flows, ultimately allowing the attacker to analyze the data contained within the captured packet

Mac Spoofing

changes the factory-assigned MAC address of a network interface on a networked device

Man-in-the-Browser

combines a man-in-the-middle attack with the use of a Trojan horse to intercept and modify web transactions in real time. In this type of attack, the attacker embeds a Trojan horse that modifies the victim's web browser by adding extensions or scripts to gather personal information or to prompt for the creation of a token-based password or transaction PIN

OSINT (Open-Source Intelligence)

information that is legally collected from publicly available origins

MITM (Man-in-the-Middle)

is a form of eavesdropping where the attacker makes an independent connection between two victims (two clients or a client and a server) and relays information between the two victims as if they are directly talking to each other over a closed connection, when in reality the attacker is controlling the information that travels between the two victims

Whaling

is a form of spear phishing that targets individuals or organizations that are known to possess a good deal of wealth

Impersonation

is a human-based attack where an attacker pretends to be someone they are not. A common scenario is when the attacker calls an employee and pretends to be calling from the help desk.

Vishing

is a human-based attack where the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system and IP-based voice messaging services as the communication medium. This is also called voice phishing

DNS Poisoning

is a network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker's choosing. Also called DNS spoofing

Driver Manipulation

is a software attack where the attacker rewrites or replaces the legitimate device driver or application programming interface (API) to enable malicious activity to be performed.

Slashdot Effect

is a sudden, temporary surge in traffic to a website that occurs when another website or other source posts a story that refers visitors to the victim website. This effect is more noticeable on smaller websites, and the increase in traffic can slow a website's response times or make it impossible to reach altogether

IP Spoofing

is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets

DDoS

is a type of DoS attack that uses multiple computers on disparate networks to launch the attack from many simultaneous sources. The attacker introduces unauthorized software that turns the computer into a zombie/drone that directs the computers to launch the attack

DoS

is a type of network attack in which an attacker attempts to disrupt or disable systems that provide network services by various means, including: • Flooding a network link with data to consume all available bandwidth. • Sending data designed to exploit known flaws in an application. • Sending multiple service requests to consume a system's resources. • Flooding a user's email inbox with spam messages, causing the genuine messages to get bounced back to the sender

Directory traversal

is an attack that allows access to commands, files, and directories that may or may not be connected to the web document root directory. It usually affects the Hypertext Transfer Protocol (HTTP)-based interface.

SQL injection

is an attack that injects a Structured Query Language (SQL) query into the input data intended for the server by accessing the client side of the application.

LDAP injection

is an attack that targets web-based applications by fabricating Lightweight Directory Access Protocol (LDAP) statements that typically are created from user input. A system is vulnerable to this attack when the application fails to filter user input properly

Cookie manipulation

is an attack where an attacker injects a meta tag in an HTTP header,making it possible to modify a cookie stored in a browser.

Hoax

is an email-based, IM-based, or web-based attack that is intended to trick the user into performing unnecessary or undesired actions, such as deleting important system files in an attempt to remove a virus. It could also be a scam to convince users to give up important information or money for an interesting offer

Vulnerability scanning

is an inspection of the potential points of exploit on a computer or network to identify security holes. This detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures

Watering Hole Attack

is when the attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites

Downgrade Attack

the attacker exploits the need for backward compatibility to force a computer system to abandon the use of encrypted messages in favor of plaintext messages.

Replay Attack

the attacker intercepts session keys or authentication traffic and uses them later to authenticate and gain access

Privilege Escalation Attack

the practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application


Set pelajaran terkait

The Movement I: Renaissance Architecture

View Set

Prep-U Ch. 62: Caring for Clients with Traumatic Musculoskeletal Injuries

View Set

Compensation Final Exam (Ch. 13 - 18) UNL

View Set

Chapter 8: Perception Interventions

View Set

ohio life insurance missed questions and answers part 8

View Set