Podcast
Questions and Answers
Which of the following best defines 'Authentication'?
Which of the following best defines 'Authentication'?
- A method to assess the risk level of an asset
- The approval process for authorized users
- A process by which a person proves their identity (correct)
- A measure of resource accessibility
What does the term 'Attack Surface' refer to?
What does the term 'Attack Surface' refer to?
- The hardware vulnerabilities present in a system
- The collection of executable software services that can be exploited (correct)
- The total number of attacks a system has experienced
- The physical area of a network exposed to potential breaches
Which of the following represents a component of the CIA triad?
Which of the following represents a component of the CIA triad?
- Integrity (correct)
- Reliability
- Authenticity
- Accessibility
What characterizes 'Malware'?
What characterizes 'Malware'?
What is meant by 'Vulnerability' in the context of information security?
What is meant by 'Vulnerability' in the context of information security?
Which type of rootkit modifies the core components of the operating system?
Which type of rootkit modifies the core components of the operating system?
What is 'Risk' in terms of information security?
What is 'Risk' in terms of information security?
What is a primary function of an encrypted virus?
What is a primary function of an encrypted virus?
What is the main action performed by Cross-site scripting (XSS)?
What is the main action performed by Cross-site scripting (XSS)?
How do polymorphic viruses primarily avoid detection?
How do polymorphic viruses primarily avoid detection?
Which option best describes 'Authorization'?
Which option best describes 'Authorization'?
What are common storage media that need protection?
What are common storage media that need protection?
Which of the following is a common countermeasure against Cross-site request forgery (CSRF)?
Which of the following is a common countermeasure against Cross-site request forgery (CSRF)?
What is a common way Trojans can affect a user's system?
What is a common way Trojans can affect a user's system?
Which of the following accurately describes rootkits?
Which of the following accurately describes rootkits?
What kind of attack allows an attacker to perform actions on behalf of an authenticated user without their consent?
What kind of attack allows an attacker to perform actions on behalf of an authenticated user without their consent?
Which characteristic isNOT typical of spyware?
Which characteristic isNOT typical of spyware?
In SQL injection, what is the purpose of entering '1=1' in an SQL query?
In SQL injection, what is the purpose of entering '1=1' in an SQL query?
What important feature distinguishes metamorphic viruses from polymorphic viruses?
What important feature distinguishes metamorphic viruses from polymorphic viruses?
Which type of rootkit is typically embedded within the hardware or firmware of components?
Which type of rootkit is typically embedded within the hardware or firmware of components?
Which of the following is a characteristic of adware?
Which of the following is a characteristic of adware?
What is one consequence of a successful SQL injection attack?
What is one consequence of a successful SQL injection attack?
Hypervisor Level Rootkits exploit which of the following?
Hypervisor Level Rootkits exploit which of the following?
Which statement best describes stealth viruses?
Which statement best describes stealth viruses?
What can result from failures in the access control mechanism?
What can result from failures in the access control mechanism?
Which of the following is NOT a common access control vulnerability?
Which of the following is NOT a common access control vulnerability?
What is a potential consequence of insufficient logging and monitoring?
What is a potential consequence of insufficient logging and monitoring?
Which OWASP Top 10 Mobile Threat relates to poorly executed coding practices during development?
Which OWASP Top 10 Mobile Threat relates to poorly executed coding practices during development?
How can XML External Entities be exploited?
How can XML External Entities be exploited?
Which of the following best defines Insufficient Binary Protections in mobile applications?
Which of the following best defines Insufficient Binary Protections in mobile applications?
What type of vulnerability is associated with allowing changes to primary keys in databases?
What type of vulnerability is associated with allowing changes to primary keys in databases?
Which OWASP mobile threat is concerned with the security of data stored within the app?
Which OWASP mobile threat is concerned with the security of data stored within the app?
What is the method used in whaling attacks?
What is the method used in whaling attacks?
How do fake WAPs typically lure users to connect to them?
How do fake WAPs typically lure users to connect to them?
What characterizes in-band SQL injection?
What characterizes in-band SQL injection?
What common security measure can help protect against eavesdropping attacks?
What common security measure can help protect against eavesdropping attacks?
How does error-based SQL injection work?
How does error-based SQL injection work?
What primarily enables a man-in-the-middle (MITM) attack to occur?
What primarily enables a man-in-the-middle (MITM) attack to occur?
What is a key characteristic of a session hijacking attack?
What is a key characteristic of a session hijacking attack?
What is the primary goal of a time-based SQL injection attack?
What is the primary goal of a time-based SQL injection attack?
Which method is NOT a recommended prevention technique for SQL injection?
Which method is NOT a recommended prevention technique for SQL injection?
Which of the following is NOT a method to protect against fake WAPs?
Which of the following is NOT a method to protect against fake WAPs?
What role does ARP poisoning play in a MITM attack?
What role does ARP poisoning play in a MITM attack?
What happens in blind Boolean-based SQL injections?
What happens in blind Boolean-based SQL injections?
Which type of attack uses fake text messages to deceive individuals into revealing information?
Which type of attack uses fake text messages to deceive individuals into revealing information?
What does credential stuffing attack utilize?
What does credential stuffing attack utilize?
Which of the following is a characteristic of broken authentication?
Which of the following is a characteristic of broken authentication?
What is one reason prepared statements protect against SQL injection?
What is one reason prepared statements protect against SQL injection?
Flashcards
Asset
Asset
Any resource that needs protection from attackers. Examples include computers, communication equipment, and storage media.
Access Control
Access Control
Defines who has access to what resources and to what extent.
CIA Triad
CIA Triad
A set of principles that ensure information is kept private (confidentiality), accurate (integrity), and available to those who need it (availability).
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Encrypted Virus
Encrypted Virus
Signup and view all the flashcards
Stealth Virus
Stealth Virus
Signup and view all the flashcards
Polymorphic Virus
Polymorphic Virus
Signup and view all the flashcards
Metamorphic Virus
Metamorphic Virus
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Rootkit
Rootkit
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
XML External Entities
XML External Entities
Signup and view all the flashcards
Insufficient Logging and Monitoring
Insufficient Logging and Monitoring
Signup and view all the flashcards
Access Control Vulnerabilities
Access Control Vulnerabilities
Signup and view all the flashcards
Inadequate Supply Chain Security
Inadequate Supply Chain Security
Signup and view all the flashcards
Insecure Authentication/Authorization
Insecure Authentication/Authorization
Signup and view all the flashcards
Insufficient Input/Output Validation
Insufficient Input/Output Validation
Signup and view all the flashcards
Insecure Communication
Insecure Communication
Signup and view all the flashcards
Insecure Data Storage
Insecure Data Storage
Signup and view all the flashcards
In-band SQLi
In-band SQLi
Signup and view all the flashcards
Error-based SQLi
Error-based SQLi
Signup and view all the flashcards
Blind Boolean-based SQLi
Blind Boolean-based SQLi
Signup and view all the flashcards
Time-based SQL Injection
Time-based SQL Injection
Signup and view all the flashcards
Prepared Statements
Prepared Statements
Signup and view all the flashcards
Restrict Database Rights
Restrict Database Rights
Signup and view all the flashcards
Vulnerability Assessments and Pentesting
Vulnerability Assessments and Pentesting
Signup and view all the flashcards
Credential Stuffing
Credential Stuffing
Signup and view all the flashcards
Application Level Rootkit
Application Level Rootkit
Signup and view all the flashcards
Kernel-Level Rootkit
Kernel-Level Rootkit
Signup and view all the flashcards
Hardware/Firmware Level Rootkit
Hardware/Firmware Level Rootkit
Signup and view all the flashcards
Hypervisor Level Rootkit
Hypervisor Level Rootkit
Signup and view all the flashcards
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Signup and view all the flashcards
Cross-Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF)
Signup and view all the flashcards
SQL Injection (SQLi)
SQL Injection (SQLi)
Signup and view all the flashcards
Improper Data Validation
Improper Data Validation
Signup and view all the flashcards
Smishing
Smishing
Signup and view all the flashcards
Whaling
Whaling
Signup and view all the flashcards
Fake WAP
Fake WAP
Signup and view all the flashcards
Eavesdropping
Eavesdropping
Signup and view all the flashcards
Man-in-the-Middle (MITM)
Man-in-the-Middle (MITM)
Signup and view all the flashcards
Session Hijacking
Session Hijacking
Signup and view all the flashcards
Study Notes
Ethical Hacking - Unit 1
- This unit covers ethical hacking
- A graphic displays a figure running, with a money sack, against a black background with the words "ETHICAL HACKING" and "UNIT 1"
- Another graphic shows a figure breaking into a phone graphic, the word "Information Security" and "Attacks and Vulnerabilities"
Introduction to Information Security
- Assets: Any resource needing protection from attackers.
- System Resources:
- Computer Equipment (Desktops, Laptops, Tablets, Servers)
- Communication Equipment (Routers, Switches, Firewalls, Modems)
- Storage Media (Hard Drives, CDs, DVDs, SD cards)
- Access Control: Defines the spectrum of access granted to entities.
- Confidentiality, Integrity, and Availability (CIA): Ensuring data privacy, consistency from origin to destination, and availability to users 24/7.
Authentication and Authorization
- Authentication: Process where a person proves their identity (passwords, cards, biometrics).
- Authorization: Specifies the access levels for authorized users to resources.
- Risk: The chances of a resource or asset being attacked.
- Risk Analysis: Determines the level of risk associated with system assets.
- Threat: The amount of danger the system faces from attackers.
- Threat Types: Snooping, Traffic Analysis, Modification, Masquerading, Replaying, Denial of Service,
Vulnerability and Attack Surface
- Vulnerability: System weaknesses or loopholes in hardware, software, applications, and protocols exploited by attackers.
- Attack Surface: The combination of software services an attacker can exploit due to vulnerabilities or insecure configurations.
- Malware: Malicious software intentionally included or inserted into a system for harmful purposes.
Types of Malware
- Worms: Self-replicating malware that spreads across networks without a host program.
- Viruses: Malware that attaches itself to programs and replicates copies of itself.
- Structure: Has infection mechanism, trigger, and payload.
- Phases: Dormant, propagation, triggering, execution.
- Types: Encrypted, Stealth, Polymorphic, Metamorphic
- Trojans: Malware disguised as legitimate software, while secretly executing unwanted tasks.
- Possible damages: Data theft, system crashes, slowdowns, launchpads for DDoS attacks, remotely run commands, keystroke interception.
- Spyware: Software for gathering user interaction information and details without permission.
- Adware: Spyware that displays advertisements.
- System Monitors: Spyware that monitors system activities.
- Tracking Cookies: Spyware that collects data about user behavior on the Internet.
- Rootkits: Software designed to provide privileged access to a remote user.
- Types: Application level, kernel level, hardware/firmware level, hypervisor level
Types of Vulnerabilities (Identified by OWASP)
- Cross-Site Scripting (XSS): Injects malicious scripts into web pages.
- Cross-Site Request Forgery (CSRF/XSRF): Tricks users into performing unwanted actions on a website.
- SQL Injection (SQLI): Inserts harmful SQL code to access data or control the system.
- Types: In-band, Error-based, Blind Boolean-based, Time-based
- Broken Authentication: Vulnerable authentication that allows attackers to compromise credentials, tokens, etc.
- Input Parameter Manipulation: Modifies data between the browser and web application.
Types of Attacks & Prevention Mechanisms
- Keystroke Logging: Records keystrokes covertly, either by software or hardware.
- Denial of Service (DoS): Prevents normal communication with a resource by overwhelming requests.
- Distributed Denial of Service (DDoS): Same as DoS, but uses multiple computers or machines.
- Watering Hole Attack: Targets trusted services to deliver a malicious payload to an organization.
- Brute-Force Attack: Uses trial-and-error to crack passwords/credentials.
- Phishing : Tries to acquire sensitive data like bank account info, emails, passwords and credit card information
- Cat Phishing : Includes creating a fake personality to steal personal data
- Voice Phishing (Vishing): Malicious calls to steal sensitive data
- SMS Phishing (Smishing) : Uses fake mobile texts to trick people into downloading malware,
- Whaling : Targets high-profile individuals,
- Fake WAP: Mimic legitimate Wi-Fi hotspots
- Eavesdropping : Passively observing communications between devices.
- Man-in-the-Middle (MITM): Places a hacker in between the communication channels
Other attack types
- Session Hijacking: Stealing sensitive information by hijacking a valid online session.
- Clickjacking: Tricks users into clicking on different objects(link) than what they intended to click.
- URL Obfuscation : Modifies a URL to conceal the legitimate location
Other security aspects
- Buffer Overflow: When more data than allocated is put into a buffer, leading to data corruption.
- DNS Cache Poisoning : Modifies DNS cache to point to a false IP address
- ARP Poisoning : Changes the relationship between IP address and MAC address to redirect traffic to a attacker's machine
- Identity Theft: Stealing personal information to commit fraud.
- IoT Attacks: Gaining access to sensitive data via Internet of Things (IoT) devices.
- Bots and Botnets: Automated malicious software and networks of infected computers.
- CVE Database: Centralized database of common vulnerabilities and exposures in software and hardware.
Additional Information
- OWASP Mobile Top 10: List of top 10 mobile security threats identified by Open Web Application Security Project (OWASP).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.