Security+ Objectives 1.2

Brittany Morris
6 min readDec 31, 2020

--

1.2 Compare and contrast types of attacks.

Social Engineering — The practice of using social tactics to gain information. Social engineers attempt to gain information from people, or get people to do things they wouldn’t normally do.

  • Phishing — The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link.
  • Spear Phishing — A targeted for of phishing. Spear phishing attacks attempt to target specific groups of users, such as those within a specific organization or even a single user.
  • Whaling — A form of spear phishing that attempts to target high-level executives. When successful, attackers gain confidential company information that they might not be able to get anywhere else.
  • Vishing — Phone v ersion of email phishing. Uses automated messages to steal personal information.
  • Tailgating — A social engineering attack where one person follows behind another person without using credentials. Mantraps help prevent tailgating.
  • Mantrap — A physical security mechanism designed to control access to a secure area. A mantrap prevents tailgating.
  • Impersonation — emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.
  • Dumpster Diving — The practice of searching through trash looking to gain information from discarded documents. Shredding or burning papers helps prevent the success of dumpster diving.
  • Shoulder Surfing — The practice of looking over someone’s shoulder to obtain information, such as on a computer screen. A screen filter places over a monitor helps reduce the success of shoulder surfing.
  • Hoax — A message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist.
  • Watering hole attack — An attack method that infects web sites that a group is likely to trust and visit.

Social Engineering Principles (Reasons for effectiveness)

  • Authority
  • Intimidation
  • Consensus
  • Scarcity
  • Familiarity
  • Trust
  • Urgency

Application/ Service attack — An attack that works by exploiting a known bug in one of the applications running on a server

  • DoS — Denial of Service. An attack meant to shut down a machine or network, making it inaccessible to its intended users. This is done by flooding the target with traffic, or sending it information that triggers a crash.
  • DDoS — Distributed denial-of-service. An attack on a system launched from multiple sources intended to make a computer’s resources or services unavailable to users. DDoS attacks typically include sustained, abnormally high traffic.
  • Man-in-the-middle — MITM — An attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems.
  • Buffer overflow — An error that occurs when an application receives more input, or different input, than it expects. It exposes system memory that is normally inaccessible.
  • Injection — An attack that injects code or commands. Common injection attacks are Dynamic Link Library (DLL) injections, command injection, and SQL injection attacks.
  • Cross-site scripting — XSS — A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site’s code, which executes when a user visits the site.
  • Cross-site request forgery — XSRF — A web application attack, XSRF attacks trick users into performing actions on web sites, such as making purchases, without their knowledge.
  • Privilege escalation — The process of gaining elevated rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges.
  • ARP poisoning — Address Resolution Protocol Poisoning — An attack that misleads systems about the actual MAC address of a system
  • Amplification — An attack that increases the amount of bandwidth sent to a victim.
  • DNS poisoning — Domain Name System Poisoning — An attack that modifies or corrupts DNS results.
  • Domain hijacking — An attack that changes the registration information of a domain name without permissions from the owner of the domain.
  • Man-in-the-browser — An attack that injects vulnerable web browsers. It can allow the attacker to capture browser session data which can include keystrokes.
  • Zero day attack — Attacks that take advantage of zero-day vulnerabilities.
  • Zero-day vulnerabilities- A vulnerability or bug that is unknown to trusted sources but can be exploited by attackers.
  • Replay — An attack where the data is captured and replayed. Attackers can modify the data before replaying it.
  • Pass the hash — A password attack that captures and uses the hash of a password. It attempt to log on as the user with the hash and is often associated with the Microsoft NTLM (New Technology LAN Manager protocol.

Hijacking and related attacks

  • Clickjacking — An attack that tricks users into clicking something other than what they think they’re clicking.
  • Session hijacking — An attack that attempt to impersonate a user by capturing and using a session ID which is stored in cookies.
  • URL Hijacking — The purchase of a domain name that is close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called type squatting.
  • Typo Squatting — The purchase of a domain name that is close to a legitimate domain name. Often attackers trick users when they use the misspelled domain name.
  • MAC Spoofing — An attack that changes the source MAC address
  • IP Spoofing — An attack that changes the source IP address.

Driver Manipulation

  • Shimming — A driver manipulation method. It uses additional code to modify the behavior of a driver.
  • Refactoring — A driver manipulation method. Developers rewrite the code without changing the driver’s behavior.

Wireless Attacks

  • Replay — An attack where the data is captured and replayed via a wireless connection. Often the data is altered before it is replayed.
  • IV — Initialization Vector Attack — A wireless attack that attempts to discover the IV. Legacy wireless security protocols are susceptible to IV attacks
  • Evil Twin — A type of rogue Access Point (AP). An evil twin has the same SSID (Service Set Identifier) as a legitimate AP.
  • Rogue AP — An unauthorized access point. It can be placed by an attacker or an person who hasn’t obtained permission to do so.
  • Jamming — A DoS (Denial of service) attack against wireless networks. It transmits noise on the same frequency used by a wireless network.
  • WPS — Wi-Fi Protected Setup. A method that allows users to easily configure a wireless network, often by using only a PIN. WPS brute force attack can discover the PIN.
  • Bluejacking — An attack against bluetooth devices. It is the practice of sending unsolicited messages to nearby Bluetooth devices.
  • Bluesnarfing — An attack against Bluetooth devices. Attackers gain unauthorized access to Bluetooh devices and can access all the data on the device.
  • RFID — Radio-Frequency Identification — Attacks against radio-frequency identification systems. Some common RFID attacks are eavesdropping, replay, and DoS.
  • NFC — Near Field Communication — An attack againist mobile devices that use near field communication (NFC). NFC is a group of standards that allow mobile devices to communicate with nearby mobile devices.
  • Disassociation — An attack that removes wireless clients from a wireless network.

Cryptographic attacks

  • Birthday — a password attack named after the birthday paradox in probability theory. The paradox stats that for any random group of 23 people, there is a 50 percent chance that 2 of them have the same birthday.
  • Known plain-text/ cipher text — A cryptographic attack that decrypts encrypted data. In this attack, the attacker know the plain-text used to create cipher-text
  • Rainbow Tables — A file containing precomputed hashes for character combinations. Rainbow table can not be used if the hash is salted.
  • Dictionary — A password attack that uses a file of words and character combinations. The attack tries every entry within the file when trying to guess a password.
  • Brute Force — A password attack that attempts to guess a password.
  • Brute Force Online — Brute force attacks that guess passwords of online systems
  • Brute Force Offline — Brute force attacks that guess passwords contained in a file or database
  • Collision — A hash collision occurs when two different passwords create the same hash.
  • Downgrade — A type of attack that forces a system to downgrade its security. The attack then exploits the lesser security control.
  • Weak implementations — An attack that targets the vulnerability of weak encryption.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response