Term
| Escalation of privileges is between |
|
Definition
| Gaining Access and Maintaining Access |
|
|
Term
|
Definition
| Use a specialized set of tools, techniques, knowledge, and skills to bypass computer security measures. |
|
|
Term
| This is sent with digital cert |
|
Definition
| Public (key is located where). |
|
|
Term
| COllision attack (definition) |
|
Definition
| The unlikely possibility that two different values will be computed to the same hash. |
|
|
Term
|
Definition
| Process of gathering information on computers/networks. High level blueprint from public information. |
|
|
Term
|
Definition
| contains useful information |
|
|
Term
| An email process used to assist in determining an attack vector |
|
Definition
| Send email and watch what comes back |
|
|
Term
| Make use of the Korek implementation for WEP cracking (2) |
|
Definition
|
|
Term
| Aircrack is *much faster* than what at WEP cracking |
|
Definition
|
|
Term
| Cain is *much slower* than what at WEP cracking |
|
Definition
|
|
Term
| "mis-association" attacks" AKA (2) |
|
Definition
| Rogue APs are also known as evil twins |
|
|
Term
|
Definition
|
|
Term
| Keyloggers are what category |
|
Definition
|
|
Term
|
Definition
| DoS attack that causes permanent damage to a system / bricking a system. |
|
|
Term
| Software keylogger (stealth ability level) |
|
Definition
| Easy to spot with antivirus and other scanning options |
|
|
Term
|
Definition
| Almost impossible to detect. |
|
|
Term
| dot-dot-slash attack (AKA) |
|
Definition
| Directory traversal; a variant of the "Unicode" / unvalidated input attack. |
|
|
Term
| Convert to Unicode for what |
|
Definition
| Standard obfuscation method. |
|
|
Term
| Unvalidated Input Attack (def) |
|
Definition
| Server has not been configured to accept only specific input during an HTTP GET, so an attacker can craft the request to ask for command prompts, to try administrative access passwords. |
|
|
Term
| Windows system password locations (2) |
|
Definition
| c:\windows\system32\config\SAM, c:\windows\repair\SAM). |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Use port 80 packets to deliver payload because port 80 is usually open. |
|
|
Term
|
Definition
| Data going back to a fake address cannot be seen by the attacker. |
|
|
Term
| Wireless security features |
|
Definition
| Encryption algorithms(WEP/WPA), and physical concerns (placement of APs and antennas used) |
|
|
Term
| SSIDs are no help to what |
|
Definition
| Security. do nothing for security, other than identify which network you're on. |
|
|
Term
|
Definition
| Vulnerability found in web applications which enables attackers to inject client-side script into web pages viewed by other users. Result: attackers bypass access controls such as the same origin policy. |
|
|
Term
|
Definition
| Reflected/non-persistent and stored/persistent. |
|
|
Term
|
Definition
| XSS type where the victim executes malicious code passed via email or a neutral site, against legitimate site. |
|
|
Term
|
Definition
| XSS type where the actual web page contains malicious code, such as in a forum post. |
|
|
Term
|
Definition
| The process of evaluating assets to ascertain the amount of vulnerability they represent to the company. |
|
|
Term
|
Definition
| Accept, mitigate, transfer, or avoid. |
|
|
Term
|
Definition
| Secret entry point into a program, written into the program by the legitimate application developer. They typically bypass authentication, so if found, are dangerous. |
|
|