What is the purpose of malicious activity in cybersecurity?
Malicious activity includes constantly evolving threats in the digital age.
Name the types of Distributed Denial of Service (DDoS) attacks.
These variants represent different methods of executing DDoS attacks.
What are the types of Domain Name Server (DNS) attacks?
Each type exploits different vulnerabilities within the DNS infrastructure.
Define Privilege Escalation Attack.
Exploiting system vulnerability to gain elevated access
This attack allows unauthorized users to gain higher-level permissions.
What are the indicators of compromise (IoC)?
IoCs are signs that may indicate a security breach.
True or false: A Flood Attack is a type of DDoS attack.
TRUE
Flood attacks, such as Ping Flood and SYN Flood, are common methods used in DDoS attacks.
What is a Permanent Denial of Service (PDOS) attack?
Exploits security flaws to break a networking device permanently
This attack requires a full firmware reload to restore the device.
What is the function of a Black Hole or Sinkhole in DDoS mitigation?
Routes attacking IP traffic to a non-existent server
This is an effective but temporary solution to manage DDoS attacks.
What does DNS Cache Poisoning do?
Corrupts a DNS resolver’s cache with false information
This attack redirects users to malicious websites.
What is Directory Traversal Attack?
Exploiting insufficient security validation of user-supplied input file names
This attack allows access to commands, files, and directories outside the web document root.
Define Replay Attacks.
Malicious or fraudulent repeat/delay of a valid data transmission
This attack involves intercepting data and retransmitting it later.
What is Session Hijacking?
Attacker takes over a user session to gain unauthorized access
This can occur through the theft or modification of cookies.
What is the difference between Vertical and Horizontal Privilege Escalation?
Vertical escalation leads to admin-level permissions, while horizontal involves accessing unauthorized resources.
What is a Rootkit?
Class of malware that conceals its presence by modifying system files
Rootkits can be challenging to detect and provide attackers with persistence.
What is Cookie Poisoning?
Modifies the contents of a cookie after it has been generated
This can exploit vulnerabilities in the web application.
What is an On-Path Attack?
Attacker positions their workstation between two hosts during communication
This allows the attacker to capture, monitor, and relay communications.
What is a Credential Replay Attack?
Capturing a user’s login credentials during a session and reusing them
This type of replay attack allows unauthorized access.
What does WPA3 stand for?
Wi-Fi Protected Access 3
WPA3 is a security protocol designed to enhance wireless network security.
What is a Replay Attack?
An attack where valid data transmission is maliciously repeated or delayed
Common in wireless network attacks; can also be used in wired networks.
In a Relay Attack, what role does the attacker play?
The attacker becomes part of the conversation between two hosts
Serves as a proxy and can read or modify communications between the hosts.
What are the challenges associated with Replay and Relay attacks?
These challenges make it difficult for attackers to craft communications.
What is SSL Stripping?
An attack that tricks the encryption application into presenting an HTTP connection instead of HTTPS
Enables attackers to capture unencrypted data when the user believes they are using a secure connection.
What is a Downgrade Attack?
An attacker forces a client or server to abandon a higher security mode in favor of a lower security mode
This can occur in various encryption and protection methods, including Wi-Fi and VPNs.
What is LDAP?
An open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network
Commonly used in directory services.