Malicious Activity Flashcards

(38 cards)

1
Q

What is the purpose of malicious activity in cybersecurity?

A
  • Delve into cyber threats
  • Understand types, mechanisms, and impacts

Malicious activity includes constantly evolving threats in the digital age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the types of Distributed Denial of Service (DDoS) attacks.

A
  • Denial of Service
  • Amplified DDoS
  • Reflected DDoS

These variants represent different methods of executing DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of Domain Name Server (DNS) attacks?

A
  • DNS Cache Poisoning
  • DNS Amplification
  • DNS Tunneling
  • Domain Hijacking
  • DNS Zone Transfer

Each type exploits different vulnerabilities within the DNS infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Privilege Escalation Attack.

A

Exploiting system vulnerability to gain elevated access

This attack allows unauthorized users to gain higher-level permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the indicators of compromise (IoC)?

A
  • Account lockout
  • Concurrent session usage
  • Blocked content
  • Impossible travel
  • Resource consumption
  • Inaccessibility
  • Out-of-cycle logging
  • Published documents indicating hacking
  • Missing logs

IoCs are signs that may indicate a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false: A Flood Attack is a type of DDoS attack.

A

TRUE

Flood attacks, such as Ping Flood and SYN Flood, are common methods used in DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Permanent Denial of Service (PDOS) attack?

A

Exploits security flaws to break a networking device permanently

This attack requires a full firmware reload to restore the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of a Black Hole or Sinkhole in DDoS mitigation?

A

Routes attacking IP traffic to a non-existent server

This is an effective but temporary solution to manage DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does DNS Cache Poisoning do?

A

Corrupts a DNS resolver’s cache with false information

This attack redirects users to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Directory Traversal Attack?

A

Exploiting insufficient security validation of user-supplied input file names

This attack allows access to commands, files, and directories outside the web document root.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Replay Attacks.

A

Malicious or fraudulent repeat/delay of a valid data transmission

This attack involves intercepting data and retransmitting it later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Session Hijacking?

A

Attacker takes over a user session to gain unauthorized access

This can occur through the theft or modification of cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between Vertical and Horizontal Privilege Escalation?

A
  • Vertical: From normal user to higher privilege
  • Horizontal: Accessing resources at the same level

Vertical escalation leads to admin-level permissions, while horizontal involves accessing unauthorized resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Rootkit?

A

Class of malware that conceals its presence by modifying system files

Rootkits can be challenging to detect and provide attackers with persistence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Cookie Poisoning?

A

Modifies the contents of a cookie after it has been generated

This can exploit vulnerabilities in the web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an On-Path Attack?

A

Attacker positions their workstation between two hosts during communication

This allows the attacker to capture, monitor, and relay communications.

17
Q

What is a Credential Replay Attack?

A

Capturing a user’s login credentials during a session and reusing them

This type of replay attack allows unauthorized access.

18
Q

What does WPA3 stand for?

A

Wi-Fi Protected Access 3

WPA3 is a security protocol designed to enhance wireless network security.

19
Q

What is a Replay Attack?

A

An attack where valid data transmission is maliciously repeated or delayed

Common in wireless network attacks; can also be used in wired networks.

20
Q

In a Relay Attack, what role does the attacker play?

A

The attacker becomes part of the conversation between two hosts

Serves as a proxy and can read or modify communications between the hosts.

21
Q

What are the challenges associated with Replay and Relay attacks?

A
  • Encryption complicates interception
  • Strong encryption schemes like TLS 1.3 pose challenges for attackers

These challenges make it difficult for attackers to craft communications.

22
Q

What is SSL Stripping?

A

An attack that tricks the encryption application into presenting an HTTP connection instead of HTTPS

Enables attackers to capture unencrypted data when the user believes they are using a secure connection.

23
Q

What is a Downgrade Attack?

A

An attacker forces a client or server to abandon a higher security mode in favor of a lower security mode

This can occur in various encryption and protection methods, including Wi-Fi and VPNs.

24
Q

What is LDAP?

A

An open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network

Commonly used in directory services.

25
What is **LDAP Injection**?
An application attack that targets web-based applications by fabricating LDAP statements typically created by user input ## Footnote Use input validation and input sanitization as protection against this attack.
26
What occurs during a **Command Injection**?
A threat actor executes arbitrary shell commands on a host via a vulnerable web application ## Footnote This can lead to unauthorized access and control over the system.
27
What is **Process Injection**?
Method of executing arbitrary code in the address space of a separate live process ## Footnote Various techniques include DLL injection, thread execution hijacking, and process hollowing.
28
What are some **mitigation strategies** for injection attacks?
* Endpoint security solutions * Security Kernel Modules * Practice of Least Privilege ## Footnote These strategies help to block common sequences of attack behavior.
29
What are **Indicators of Compromise (IoC)**?
Pieces of forensic data that identify potentially malicious activity on a network or system ## Footnote Serves as digital evidence that a security breach has occurred.
30
What does an **Account Lockout** indicate?
Occurs when an account is locked due to multiple failed login attempts ## Footnote This may suggest a potential brute force attack to gain access.
31
What does **Concurrent Session Usage** refer to?
Multiple active sessions from a single user account ## Footnote Indicates a possible account compromise when the legitimate user is also logged in.
32
What does **Blocked Content** suggest?
Attempts to access or download content blocked by security protocols ## Footnote Indicates a user trying to access malicious content or an attacker attempting to steal data.
33
What does **Impossible Travel** detect?
Logins from geographically distant locations within an unreasonably short timeframe ## Footnote Indicates a likely account compromise as physical travel between these locations is impossible.
34
What does **Resource Consumption** indicate?
Unusual spikes in resource utilization such as CPU, memory, or network bandwidth ## Footnote May indicate malware infections or Distributed Denial of Service (DDoS) attacks.
35
What does **Resource Inaccessibility** suggest?
Inability to access resources like files, databases, or network services ## Footnote Suggests a ransomware attack, where files are encrypted, and a ransom is demanded.
36
What does **Out-of-Cycle Logging** indicate?
Log entries occurring at unusual times ## Footnote Indicates an attacker trying to hide their activities during off-peak hours.
37
What does **Missing Logs** signify?
Logs have been deleted to hide attacker activities ## Footnote May result in gaps in the log data, making it harder to trace the attacker's actions.
38
What are **Published Articles or Documents** in the context of cybersecurity?
Attackers publicly disclose their actions, boasting about their skills or causing reputational damage ## Footnote Can occur on social media, hacker forums, or the victim's own website.