Podcast
Questions and Answers
What is the term used to describe a program written to take advantage of a known vulnerability?
What is the term used to describe a program written to take advantage of a known vulnerability?
Software vulnerabilities are typically introduced by errors in operating system or application code.
Software vulnerabilities are typically introduced by errors in operating system or application code.
True (A)
What is one way to avoid the SYNful Knock vulnerability when installing a new version of IOS?
What is one way to avoid the SYNful Knock vulnerability when installing a new version of IOS?
Verify the integrity of the downloaded IOS image
The goal of software updates is to stay current and avoid ________ of vulnerabilities.
The goal of software updates is to stay current and avoid ________ of vulnerabilities.
Signup and view all the answers
Match the following items with their corresponding information:
Match the following items with their corresponding information:
Signup and view all the answers
Which major vulnerability was discovered in Cisco IOS in 2015?
Which major vulnerability was discovered in Cisco IOS in 2015?
Signup and view all the answers
Hardware vulnerabilities are generally widespread and affect many different device models.
Hardware vulnerabilities are generally widespread and affect many different device models.
Signup and view all the answers
A ________ occurs when data is written beyond the limits of a buffer.
A ________ occurs when data is written beyond the limits of a buffer.
Signup and view all the answers
Which of the following can a buffer overflow lead to?
Which of the following can a buffer overflow lead to?
Signup and view all the answers
Which type of vulnerability occurs when the output of an event depends on ordered or timed outputs?
Which type of vulnerability occurs when the output of an event depends on ordered or timed outputs?
Signup and view all the answers
Creating your own security algorithms is recommended for enhanced security.
Creating your own security algorithms is recommended for enhanced security.
Signup and view all the answers
What is malware?
What is malware?
Signup and view all the answers
__________ holds a computer system or data captive until a payment is made.
__________ holds a computer system or data captive until a payment is made.
Signup and view all the answers
Match the malware type with its description:
Match the malware type with its description:
Signup and view all the answers
Which of the following describes a bot?
Which of the following describes a bot?
Signup and view all the answers
Physical access control is not a necessary part of computer security; software protections are sufficient.
Physical access control is not a necessary part of computer security; software protections are sufficient.
Signup and view all the answers
How does scareware typically trick users?
How does scareware typically trick users?
Signup and view all the answers
A program that processes an image receives data that contains malicious content due to _______________.
A program that processes an image receives data that contains malicious content due to _______________.
Signup and view all the answers
Which of these malware types is primarily designed to create a persistent backdoor on a system?
Which of these malware types is primarily designed to create a persistent backdoor on a system?
Signup and view all the answers
Which type of malware replicates itself and can slow down networks?
Which type of malware replicates itself and can slow down networks?
Signup and view all the answers
A computer infected by a rootkit can be cleaned with antivirus software without needing to be wiped and reinstalled.
A computer infected by a rootkit can be cleaned with antivirus software without needing to be wiped and reinstalled.
Signup and view all the answers
What is a common symptom of malware infection related to CPU usage?
What is a common symptom of malware infection related to CPU usage?
Signup and view all the answers
A man-in-the-middle attack intercepts user information before relaying it to its intended ______.
A man-in-the-middle attack intercepts user information before relaying it to its intended ______.
Signup and view all the answers
Which of the following methods can viruses use to spread?
Which of the following methods can viruses use to spread?
Signup and view all the answers
Trojans can only be found in executable files.
Trojans can only be found in executable files.
Signup and view all the answers
What is the purpose of a Man-In-The-Mobile (MitMo) attack?
What is the purpose of a Man-In-The-Mobile (MitMo) attack?
Signup and view all the answers
Rootkits are hard to detect because they modify system forensics and ______ tools.
Rootkits are hard to detect because they modify system forensics and ______ tools.
Signup and view all the answers
Which of these is MOST likely to be stolen during a Man-In-The-Middle attack?
Which of these is MOST likely to be stolen during a Man-In-The-Middle attack?
Signup and view all the answers
Flashcards
Non-validated input
Non-validated input
Data input that hasn't been checked for validity, allowing malicious content.
Race conditions
Race conditions
A vulnerability where events occur out of the intended order or timing, affecting outputs.
Weaknesses in security practices
Weaknesses in security practices
Using homemade security algorithms instead of established libraries can create vulnerabilities.
Access-control problems
Access-control problems
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Scareware
Scareware
Signup and view all the flashcards
Rootkits
Rootkits
Signup and view all the flashcards
Security Vulnerabilities
Security Vulnerabilities
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
Software Vulnerabilities
Software Vulnerabilities
Signup and view all the flashcards
Major Vulnerability Example
Major Vulnerability Example
Signup and view all the flashcards
Google Project Zero
Google Project Zero
Signup and view all the flashcards
Hardware Vulnerabilities
Hardware Vulnerabilities
Signup and view all the flashcards
Rowhammer
Rowhammer
Signup and view all the flashcards
Buffer Overflow
Buffer Overflow
Signup and view all the flashcards
Purpose of Software Updates
Purpose of Software Updates
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Trojan horse
Trojan horse
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Man-In-The-Middle (MitM)
Man-In-The-Middle (MitM)
Signup and view all the flashcards
Man-In-The-Mobile (MitMo)
Man-In-The-Mobile (MitMo)
Signup and view all the flashcards
CPU Usage Increase
CPU Usage Increase
Signup and view all the flashcards
Slow Computer Speed
Slow Computer Speed
Signup and view all the flashcards
Unknown Processes
Unknown Processes
Signup and view all the flashcards
Exfiltration
Exfiltration
Signup and view all the flashcards
Study Notes
Chapter 2: Attacks, Concepts, and Techniques
- This chapter covers security vulnerabilities, exploits, attacks, and malware.
Finding Security Vulnerabilities
- Security vulnerabilities are flaws in software or hardware.
- Malicious users exploit vulnerabilities.
- An exploit is a program designed to take advantage of a vulnerability.
- An attack is the act of using an exploit against a vulnerability.
Software Vulnerabilities
- Software vulnerabilities often arise from errors in operating systems or application code.
- Operating system vendors regularly release patches and updates to address these flaws.
- SYNful Knock (2015) was a significant vulnerability in Cisco IOS, allowing attackers to control routers, monitor network communication, and infect other devices.
Software Vulnerabilities (continued)
- Software updates aim to prevent exploitation of vulnerabilities.
- Some companies have dedicated security teams focused on discovering vulnerabilities in software, like Google's Project Zero.
Hardware Vulnerabilities
- Hardware vulnerabilities stem from design flaws.
- Rowhammer is an exploit that takes advantage of close capacitor placement in RAM memory, affecting neighboring capacitors.
- Hardware vulnerabilities are often specific to device models.
- Hardware exploits are prevalent in targeted attacks.
Categorizing Security Vulnerabilities: Software
- Buffer Overflow: Writing data beyond a buffer's allocated memory, potentially causing system crashes, data compromises, or privilege escalation.
- Non-validated Input: Programs accepting potentially malicious data without proper validation, leading to memory issues and security flaws (e.g., malicious image files with incorrect dimensions).
- Race Conditions: Event outcomes depending on the order or timing of events, when these are not properly synchronized can lead to security vulnerabilities.
- Weaknesses in Security Practices: Avoiding creating custom security algorithms and relying on pre-tested security libraries to avoid introducing new weaknesses.
Categorizing Security Vulnerabilities: Access-Control Problems
- Proper management of physical access to equipment is crucial.
- Access controls define who can access resources.
- Operating systems sometimes cannot enforce access restrictions if read or write access directly to storage devices bypass them. Protecting machines and data requires access restrictions and data encryption.
Types of Malware
- Malware is malicious software.
- Spyware: Monitors user activity.
- Adware: Displays advertisements.
- Bot: A malicious program acting under commands from a botnet.
- Ransomware: Holds systems or data hostage until a ransom is paid. It encrypts data, making it inaccessible.
- Scareware: Attempts to trick users into taking actions by using fear and posing as operating system components.
- Rootkits: Backdoor access, modifies system utilities, and are very difficult to detect. Requires a wipe and reinstall to remove.
- Virus: Self-replicating code attached to executable files. Can be harmless or destructive and can spread through various means.
- Trojan Horse: A disguised malware that conceals malicious code. Commonly disguised as benign files, often found in images, videos, audio clips.
- Worms: Self-replicating malware that spreads over networks. They often cause significant network congestion.
- Man-in-the-Middle (MitM) & Man-in-the-Mobile (MitMo): Intercepting communication between two parties without their knowledge to steal information like financial data, or capture two step authentication SMS messages.
Symptoms of Malware
- Increased CPU usage, decreased computer speed, frequent freezes/crashes, network issues, file modifications or deletions, appearance of unknown files/programs, erratic program behavior, unauthorized email sending.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the critical aspects of security vulnerabilities, exploits, and attacks in this chapter. Understand how malicious users exploit software flaws and learn about significant vulnerabilities like SYNful Knock. This quiz will test your knowledge on detecting and mitigating security risks.