Vulnerabilities and Attacks Flashcards

(47 cards)

1
Q

What are vulnerabilities in the context of cybersecurity?

A
  • Weaknesses or flaws in hardware
  • Software
  • Configurations
  • Processes

Consequences include unauthorized access, data breaches, and system disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the consequences of vulnerabilities?

A
  • Unauthorized Access
  • Data Breaches
  • System Disruptions

These consequences can severely impact an organization’s security and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define attacks in cybersecurity.

A
  • Deliberate actions by threat actors to exploit vulnerabilities

Forms of attacks include unauthorized access, data theft, malware infections, DoS attacks, and social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the forms of attacks in cybersecurity.

A
  • Unauthorized Access
  • Data Theft
  • Malware Infections
  • DoS Attacks
  • Social Engineering

Each form represents a different method of exploiting vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the focus areas of hardware vulnerabilities?

A
  • Firmware
  • End-of-life systems
  • Missing patches
  • Misconfigurations

Addressing these areas is crucial for mitigating hardware vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some mitigation strategies for hardware vulnerabilities?

A
  • Harden systems
  • Patch
  • Enforce baseline configurations
  • Decommission old assets
  • Isolation

These strategies help secure hardware against potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of Bluetooth vulnerabilities exist?

A
  • Bluesnarfing
  • Bluejacking
  • Bluebugging
  • Bluesmack
  • BlueBorne

Each type represents a different method of exploiting Bluetooth technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the mitigation techniques for mobile vulnerabilities?

A
  • Patch Management
  • Mobile Device Management
  • Prevent sideloading
  • Rooting

These techniques help secure mobile devices against various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are zero-day vulnerabilities?

A
  • Newly discovered and exploited vulnerabilities

They present a significant challenge as there are no known defenses or mitigations at the time of discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the types of operating system vulnerabilities.

A
  • Unpatched systems
  • Zero-days
  • Misconfigurations
  • Data exfiltration
  • Malicious updates

Each type can lead to significant security risks if not addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SQL Injection?

A
  • Exploits web app or database vulnerabilities

Attackers insert malicious SQL code into input fields to manipulate databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Cross-Site Scripting (XSS)?

A
  • Injects malicious scripts into web pages

The goal is to compromise the site’s visitors by running malicious code in their browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Buffer Overflow?

A

A software vulnerability when more data is written to a memory buffer than it can hold

This can lead to crashes or exploitation by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Race Conditions?

A
  • Multiple processes or threads accessing shared resources simultaneously

This can lead to unexpected behavior or vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key terms associated with race conditions?

A
  • Time-of-Check (TOC)
  • Target-of-Evaluation (TOE)
  • Time-of-Use (TOU)

Understanding these terms is essential for analyzing race condition vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of input validation?

A

To prevent injection attacks like SQL and XML injections

Proper input validation ensures that only legitimate data is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an XML Injection?

A
  • Targets XML data processing

Attackers exploit vulnerabilities in XML processing to manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the goal of Cross-Site Request Forgery (CSRF)?

A

Triggers actions on different websites without user consent

This can lead to unauthorized actions being performed on behalf of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is data exfiltration?

A

Involves unauthorized data transfers from an organization to an external location

Protecting against data exfiltration is crucial for maintaining data confidentiality.

20
Q

What is a malicious update?

A

Appears as legitimate security updates but contains malware or exploits

Always source updates from trusted vendors to avoid this risk.

21
Q

What is Bluesnarfing?

A

Unauthorized access to a device to steal information like contacts, call logs, and text messages

This is a type of Bluetooth attack that exploits vulnerabilities in the protocol.

22
Q

What is Bluebugging?

A

Allows attackers to take control of a device’s Bluetooth functions

Attackers can make calls, send messages, or access the internet through this method.

23
Q

What is the best practice for secure Bluetooth usage?

A
  • Turn off Bluetooth when not in use
  • Set devices to ‘non-discoverable’ mode
  • Regularly update firmware
  • Only pair with known devices
  • Use a unique PIN or passkey

These practices help mitigate the risks associated with Bluetooth vulnerabilities.

24
Q

What are the four steps to an XSS attack?

A
  • Identify input validation vulnerability
  • Craft a URL for code injection
  • Trusted site returns page with malicious code
  • Malicious code runs in client’s browser

The attack exploits the trust a user has in a website.

25
What are the **functions** of an **XSS attack**?
* Defacing the trusted website * Stealing the user’s data * Intercepting data or communications ## Footnote These functions highlight the potential damage caused by XSS attacks.
26
Name the **types of XSS attacks**.
* Non-Persistent XSS * Persistent XSS * Document Object Model (DOM) XSS ## Footnote Each type exploits vulnerabilities in different ways.
27
What is **Non-Persistent XSS**?
A XSS attack that occurs only once when launched ## Footnote It is executed server-side.
28
What is **Persistent XSS**?
Allows an attacker to insert code into a backend database ## Footnote This type is also executed server-side.
29
What is **Document Object Model (DOM) XSS**?
Exploits the client’s web browser using client-side scripts ## Footnote It modifies the content and layout of the web page.
30
What is the purpose of **Session Management**?
Enables web applications to uniquely identify a user ## Footnote It is a fundamental security component in modern web applications.
31
What is a **cookie**?
Text file used to store information about a user ## Footnote Cookies help maintain user sessions on websites.
32
What are **Non-persistent cookies**?
Also known as session cookies, reside in memory and are deleted at the end of the session ## Footnote They are used for a very short time period.
33
What are **Persistent cookies**?
Stored in the browser cache until deleted or expired ## Footnote They remain available across multiple sessions.
34
What is **Session Hijacking**?
Type of spoofing attack where the attacker replaces a host with their own machine ## Footnote This is done by spoofing the original host IP.
35
What is **Session Prediction**?
Type of spoofing attack where the attacker predicts the session token ## Footnote Prevented by using a non-predictable algorithm to generate session tokens.
36
What is **XSRF**?
Malicious script exploiting a session started on another site ## Footnote It can be disguised and does not require the victim to click on a link.
37
What are some **prevention methods** for XSRF?
* Use user-specific tokens in form submissions * Add randomness and prompt for additional information * Require two-factor authentication * Require current password for password changes ## Footnote These methods enhance security against XSRF attacks.
38
What is a **Buffer Overflow Attack**?
Occurs when a process stores data outside the allocated memory range ## Footnote It is a common initial attack vector in data breaches.
39
What are **buffers**?
Temporary storage areas used by programs to hold data ## Footnote They have a defined memory capacity.
40
What is **Smashing the Stack**?
Attackers overwrite the return address with a pointer to their malicious code ## Footnote This allows execution of the attacker's code.
41
What is a **NOP Slide**?
Attackers fill the buffer with NOP instructions to reach their code ## Footnote This technique helps in executing the attacker's code.
42
What is **Address Space Layout Randomization (ASLR)**?
Helps prevent attackers from guessing return pointer addresses ## Footnote It randomizes memory addresses used by programs.
43
What are **Race Conditions**?
Software vulnerabilities related to the order and timing of events ## Footnote Exploiting them can disrupt program behavior and gain unauthorized access.
44
What is the **Dirty COW Exploit**?
A real-world example of race condition exploitation targeting Linux and Android ## Footnote It leverages race conditions in the Copy On Write function.
45
What are the **types of Race Conditions**?
* Time-of-Check (TOC) * Time-of-Use (TOU) * Time-of-Evaluation (TOE) ## Footnote Each type describes different timing vulnerabilities.
46
What is a **mutex**?
Mutually exclusive flag that ensures only one thread can access a section of code ## Footnote It helps prevent race conditions.
47
What is a **deadlock**?
Occurs when a lock remains in place because the process it’s waiting for is terminated ## Footnote This can prevent further processing despite completion.