Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
denial of service |
prevents the victim computer from accessing local or remote services or programs |
|
Man in the Middle (MIM)
|
attacker is able to read messages between two victims
|
|
Hijack
|
attacker commandeers (takes over) the victims computers connection
|
|
break-in
|
attacker gains unauthorized access to the victim computers
|
|
ping/UDP Flood
|
excessive amount of ICMP packets
|
|
SYN Flood
|
sends bogus TCP connecton requests
|
|
MAC Flood
|
excessive amount of packets through a switch
|
|
Distributed Denial of Service (DDoS)
|
army of "slave" computers launch large bandwidth-flooding attacks
|
|
Ping of Death
|
over-sized ICMP packet
|
|
Smurf
|
ICMP packets to the broadcast IP address of a large subnet, send a barrage of response packets to the victim
|
|
WinNuke
|
"out-of-band/urgent" TCP packet
|
|
Teardrop
|
overlapping fragments
|
|
Land
|
ideentical source and destination IP
|
|
ARP Poison (arp spoofing)
|
fake address resolution packet to a victim which trick the victim coputer into sending its packets to the attacker
|
|
ICMP Redirect
|
fake message packets which alter the victims routing table
|
|
DNS Spoofing
|
fake domain name resoluton packets trick the victim computer into sending its packets to the attadker
|
|
DNS Cache Poison
|
fake domain name resolution to a victim resolver server
|
|
Agressive exploits
|
launched from the attacker against the victim
|
|
Passive exploits
|
victim connects to the attacker
|
|
Buffer Overflow
|
input more informatoin in memory than it was designed to hold
|
|
Buffer Over Read
|
read (view) more informatoin from memory than it was intended to give
|
|
SMB Relay
|
attacker relays credentials back to the victim to gain access
|
|
SMB DoS
|
malformed header to port 445
|
|
Virus
|
hostile progaram, imbeds itself in abother program and propogates itself
|
|
Worm
|
hostile program propogates without imbedding
|
|
Trojan
|
hostile program masquerading as a helpful program
|
|
Spyware
|
collects and sends information on users
|
|
Adware
|
downloads and displays advertisements
|
|
Backdoor
|
allows unauthorized access, bypassing the normal authentication procedures |
|
Key logger
|
copies the user's keystrokes
|
|
Rootkit
|
covers his/her tracks
|
|
Fork Bomb
|
large number of processes
|
|
Decompression bomb
|
inflates or expands to an enormous size
|
|
Dumpster diving
|
victim trash bin
|
|
Online Attack
|
uses internet to gain the trust of the victim
|
|
TCP Kill
|
bogus reset packets to the victim
|
|
SSL/SSHV1 MiM
|
sends fake certificate with public key to the victim
|
|
Dictionary
|
encrypts a predetermined list of words until it finds matches
|
|
Brute Force
|
encrypts every possible combination of characters and symbolsuntil it finds a match
|
|
Rainbow Tables
|
precomputed table of encrypted (hashes) |