Term
|
Definition
Someone who is a master of asking seemingly non-invasive or unimportant questions to gather information over time. |
|
|
Term
Social Engineering Attacks |
|
Definition
-Phishing -Spear Phishing (Targeted attack) -Whaling (Targets high profile execs) |
|
|
Term
|
Definition
Voice phishing. Over the phone, email. Poses as repairman, security, or someone of trust |
|
|
Term
|
Definition
Following someone into a gated badged access area. |
|
|
Term
Impersonation or Replay Attack |
|
Definition
Capture packets using sniffer potential to be re transmitted. |
|
|
Term
|
Definition
Removing trash with sensitive information |
|
|
Term
|
Definition
Someone logs in -Attacker watches keystrokes -Or strike up a conversation about kids -talk about sports see some pics -Try those as passwords |
|
|
Term
Mitigation Shoulder Surfing |
|
Definition
Privacy Screen, Masked Passwords, Technical Controls cameras and keycards |
|
|
Term
|
Definition
-Social engineering technique -Using the phone or voicemail to trick the target into providing sensitive information. -Impersonates irate customer, or employee |
|
|
Term
|
Definition
SPAM filters, Heuristics for pattern recognition, Firewalls / Deep Packet Inspection, User Training |
|
|
Term
|
Definition
Attackers plant malware on web sites that users in a company or whales like to visit that are less secure. Like golfing sites, or basketball etc. They plant the malware there to the target's systems. Attackers use code that scan the target computers for vulnerabilities and then download code to attack those vulnerabilities. |
|
|
Term
Six Principles (Reasons for effectiveness) |
|
Definition
Authority, Intimidation, Consensus/Social Proof, Familiarity/Liking, Trust, Scarcity/Urgency |
|
|
Term
|
Definition
Bad Actor appears to know or has special knowledge of the company
Poses as Position of Authority using - Technical Jargon - Name Dropping - Knowledge of Specific Systems / applications |
|
|
Term
Social Engineering - Intimidation |
|
Definition
Bad Actor poses as position of authority and tries to impose will using - Threaten Negative Action - Threaten to Release Sensitive Info - Combine with Scarcity/Urgency |
|
|
Term
Social Engineering - Consensus |
|
Definition
People act when they believe they are in alignment with a larger group. Mob Mentality, packed parking lot, loaded tip jar, positive product reviews |
|
|
Term
Social Engineering - Familiarity / Like |
|
Definition
People like what is familiar to them, like people they perceive are like them. Attacker establishes a common contact or friend to gain trust. |
|
|
Term
|
Definition
Tactics used as shortcuts to gain trust; people will act when they trust the person. |
|
|
Term
|
Definition
Act quickly or risk losing out. Sale ends in 30 minutes. |
|
|
Term
|
Definition
Modifying the SQL query that's passed to web application, SQL Server.
Adding code into a data stream: - Bypass logon - Website return usernames, passwords - App throws error and causes crash |
|
|
Term
|
Definition
Leads to remote code execution by exceeding memory set aside for application and executing malicious code |
|
|
Term
|
Definition
Like SQL Injection, inserts queries to return user accounts, level of access, group membership info. |
|
|
Term
|
Definition
Used to inject markup language statement to alter a path to a file and disclose information. |
|
|
Term
|
Definition
User clicks link in email requesting page from a server that sends malicious script. Script executes on browser goes to legitimate site and makes additional requests without the user being aware. |
|
|
Term
Cross Site Request Forgery - XSRF, or CSRF (SeeSurf) aka One Click attack |
|
Definition
-Hijacking session attack -Non Persistent: emails, blog posts, etc -Persistent: server based -Victim has recently visited a site and has a valid cookie (not expired) -Targeted attack. -Obtains Valid session ID from Cookie. |
|
|
Term
|
Definition
-Cross Site, the BROWSER runs the code because it was served from a SITE IT TRUSTS.
-Request forgery, the SERVER performs an action because it received a request from a CLIENT IT TRUSTS. |
|
|
Term
|
Definition
Obtaining elevated privs on the target -Dump SAM -Get /etc/passwd file -DLL pre-loading -Insecure or weak security on processes |
|
|
Term
|
Definition
Putting incorrect ARP information into the victims arp cache. Allows the following
-Man IN the Middle -Malicious Web Server -Session Hijacking |
|
|
Term
|
Definition
Victim's IP address is spoofed and ICMP messages are broadcast to a computer network. Every host responds to ping. |
|
|
Term
|
Definition
Vulnerabilities that are discovered and exploited before the developer has a chance to issue a patch or fix |
|
|
Term
|
Definition
Adding false record to a server to send systems to malicious web site. |
|
|
Term
|
Definition
Harvesting encrypted password values to authenticate to other servers. THey are captured with a packet analyzer and used with username to login. |
|
|
Term
|
Definition
Tricks a user into performing undesired action by clicking a concealed link. Loads another invisible page on top of the websites page. User may enter credentials or other information. |
|
|
Term
|
Definition
Items used to validate a users's session are compromised and reused. -Man in the middle -Sidejacking |
|
|
Term
|
Definition
When the initial login is encrypted but the reset of the session is not. Can be captured using packet sniffer. |
|
|
Term
|
Definition
Setting up domain names that are typos of legitimate sites like Facbook instead of Facebook or Goggle instead of Google. |
|
|
Term
|
Definition
Use misspelled Web site URL's to set up ads that have similar items for sale. |
|
|
Term
|
Definition
-Using custom databases to install code. -Designed to mimic MS Windows App Compatibility databases. |
|
|
Term
|
Definition
Fix bugs, patch code, tighten security, without adversely affecting the underlying functionality. |
|
|
Term
|
Definition
WEP with only 24 bit IV. Sniffed and able to be recognized. |
|
|
Term
|
Definition
PIN has 7 unknown digits. Cracked in 3-5 hours. Tools like Reaver. |
|
|
Term
|
Definition
Linux Pen Test tools installed on Kali |
|
|
Term
|
Definition
Sending of unauthorized messages or data to a victim's device via Bluetooth technology. Typically sending a vCard which contains a message in the name field to another Bluetooth enabled device via the OBEX ObjectExchange protocol |
|
|
Term
|
Definition
Must be discoverable. Pull data from a bluetooth device usually a phone. Contact lists, pictures, messages, PII |
|
|
Term
|
Definition
Uses two way RFID type tech NFC. Can be used to pay when 3-4 inches away. Can also allow attacker to steal data. |
|
|
Term
|
Definition
Two types of systems Active Reader Passive Tag 3 ft range, and Active Reader Active Tag 100 meters range. |
|
|
Term
|
Definition
Using a given mac address disassociate from WAP. Can use Aircrack-Ng |
|
|
Term
|
Definition
Birthday attack uses. Just running through every possible birthday as a password. The odds that a password hash will match a different password are pretty good. |
|
|
Term
|
Definition
Removing trash from dumpsters that could reveal sensitive information such as:
-Usernames and Passwords -PII -Company documents -Resumes |
|
|
Term
Dumpster Diving Mitigation |
|
Definition
-Shredder -Crosscut Shredder |
|
|
Term
|
Definition
Precomputed table of password hashes. Reduces time to brute-force a password. -Requires more storage -Requires table ofr each type of hash such as MD5, SHA1, etc |
|
|
Term
|
Definition
Attack that tries to find two hash inputs that have the same output. -Can be used to bypass security and enable a malicious file to appear legit if the hash values are the same |
|
|
Term
|
Definition
Legitimate File = Hash Value Malicious File = Hash Value
When hash values match, the file appears legitimate and can bypass virus scanners |
|
|
Term
|
Definition
An attack that forces a system to negotiate down to a lower-quality method of communication. Allowed in situations to support legacy systems. |
|
|
Term
Known Plain Text / Cipher text |
|
Definition
When both the plain text and cipher text versions are known, a mathematical relationship between the two can be determined. WPA and WEP are vulnerable to this attack but WPA-2 using AES is not. |
|
|
Term
|
Definition
Do Not USE Weak algorithms such as MD5 and SHA1
Use NIST approved algorithms like AES or TDEA (Triple Data Encryption Algorithm)
https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet
NIST Special Publication 800-57 Part 1 Revision 4: Recommendation for Key Management Part 1: General 4.2.2 Symmetric-Key Algorithms used for Encryption and Decryption The approved algorithms for encryption/decryption are symmetric key algorithms: AES and TDEA. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf |
|
|
Term
|
Definition
Nist Approved Block Ciphers |
|
|
Term
|
Definition
Triple Data Encryption Algorithm |
|
|