attacks

Cards (59)

  • TYPES OF ATTACKS
    Malware Attacks
    Social Engineering Attacks
    Denial of Service (DoS) Attacks
    On-Path Attacks
    Password Attacks
    Physical Attacks
    Insider Threats
    Advanced Persistent Threat (APT) Attacks
    SEO Poisoning
  • Malware - short for malicious software
    refers to any software that is designed to harm, disrupt or damage computer systems.
  • Malware
    refers to any software that is designed to harm, disrupt or damage computer systems.
  • SOCIAL ENGINEERING
    refers to the use of deception or manipulation to trick individuals into disclosing sensitive information or performing actions.
  • Denial of Service (DoS)
    a type of network attack that is relatively simple to carry out, even by an unskilled attacker.
  • On Path Attacks
    On-path attackers intercept or modify communications between two devices, such as a web browser and a web server, either to collect information from or to impersonate one of the devices.
  • On Path Attacks
    This type of attack is also referred to as a man-in-the-middle or man-in-the-mobile attack.
  • SEO poisoning is a technique used by threat actors to increase the prominence of their malicious websites, making them look more authentic to consumers.
  • SEO poisoning tricks the human mind by assuming the top hits are the most credible and is very effective when people fail to look closely at their search results.
  • SEO
    Search engine optimization or SEO is about improving an organization’s website so that it gains greater visibility in search engine results.
  • Password Attacks
    involve attempting to crack or guess passwords to gain unauthorized access to a system.
  • Physical attacks
    Involve physically accessing a system or device to steal or damage information.
  • Insider threats involve attacks by individuals with authorized access to an organization's information systems who misuse their privileges to steal or damage information.
  • Insider threats can be intentional or unintentional.
  • Advanced Persistent Threats (APTs)
    Attackers also achieve infiltration through advanced persistent threats (APTs) — a multi-phase, long term, stealthy and advanced operation against a specific target.
  • Advanced Persistent Threats (APTs)
    Its main purpose is to deploy customized malware on one or more of the target’s systems and remain there undetected.
  • THREAT ACTORS
    refers to an individual or group that poses a threat to the confidentiality, integrity, or availability of a system or data.
  • Threat actors can be classified based on their motivations, skills, and resources.
  • Penetration Testing or pen testing, is a way of testing the areas of weaknesses in systems by using various malicious techniques.
  • Penetration testing is a technique used in ethical hacking
  • PENETRATION TESTING LEVELS
    Black box testing
    Gray box testing
    White box testing
    Reconnaissance
  • Black box testing is the least time-consuming and the least expensive.
  • Gray box testing is a combination of black box and white box testing.
  • White box testing is the most time-consuming and the most expensive
  • Reconnaissance is the first stage in the Cyber Kill Chain and involves researching potential targets before carrying out any penetration testing.
  • Pentesting Phases
    Planning
    Discovery
    Attack
    Reporting
  • Planning - establishes the rules of engagement for conducting the test.
  • Discovery - Conducting reconnaissance on the target to gain information
  • Attack - At this phase, you seek to gain access or penetrate the system using the information gathered in the previous phase.
  • Reporting - At this phase, the tester delivers to the organization detailed documentation that includes the vulnerabilities identified, actions taken and the results.
  • Vulnerabilities are any kind of software or hardware defect.
  • A program written to take advantage of a known vulnerability is referred to as an Exploit.
  • The TCP/IP model creates a set of rules that allows us all to take a computer (or mobile
    device) out of the box, plug in all the right cables, turn it on, and connect to and use the network.
  •  
    The TCP/IP model both defines and references a large collection of protocols that allow
    computers to communicate.
  • Cybercriminals - are individuals or groups who use technology to commit crimes, such as stealing sensitive data, holding data for ransom, or conducting financial fraud. They are motivated by financial gain.
  • Hacktivists - are individuals or groups who use hacking techniques to promote a political or social agenda. They may target government organizations, corporations, or other entities they see as oppressive or unjust.
  • State-sponsored attackers - are individuals or groups who are backed by a government and conduct cyber attacks against other nations or organizations. They may seek to steal sensitive data, disrupt critical infrastructure, or conduct espionage.
  • Insiders - are individuals within an organization who have authorized access to sensitive data and systems. They may intentionally or unintentionally cause harm to the organization, such as stealing data or leaking information.
  • Script Kiddies - are individuals who have limited technical skills but use automated tools to launch attacks against vulnerable systems. They are often motivated by the thrill of causing damage or disrupting systems.
  • Terrorists - may use cyber attacks as part of their overall strategy to cause harm to their targets. They may seek to disrupt critical infrastructure or steal sensitive data.