[CERTMaster]
defined event, such as the admin's account becoming disabled.
Also defined as memore-resident viruses that replicate over network resources. **Note: the primary
effect of a worm infestation is to rapidly consume network bandwidth as the worm replicates.
and install software on it. **Also referred to as Rat backdoor applications - see CLC definition for more
to detect this kind of malicious script or program, so the security specialist would not be able to discover the
script during an investigation. The security specialist would uncover the mine once it gets executed and
causes damage.
processes no longer reveal their presence.
Trojan tries to compromise the security of the target computer.
license agreement.
the files without obtaining the private encryption key, held by the attacker.
or without the user's knowledge
network. Each host directs its echo responses to the victim server.
DDoS attack- a DoS launched from multiple, compromised computers. Handlers compromise multiple zombie
(agent) PC's with DoS tools (bots), forming a botnet.
mass-mail spam attack -
Trojan Horse Malware -
Skimming - using a counterfeit card reader to capture card details, which can then program a duplicate
Password spraying - a horizontal brute-force online attack. This means that the attacker chooses one
or more common passwords (for example, "password" or 123456) and tries to use them in conjunction with
multiple usernames.
Card cloning - refers to making one or more copies of an existing card.
Malicious charging - an attacker can place a malicious plug or charging cable in public locations to gain access to
a device connected to it.
Birthday attack - a type of brute force attack aimed at exploiting collisions in hash functions. A collision is where
a function produces the same hash value for 2 different plaintexts.
How to protect against birthday attacks:
Pass-the-Hash attack - If an attacker obtains the hash of a user's password, it is possible to authenticate with
the hash, without cracking it.
Man-in-the-Middle (MitM) - a form of eaves dropping in which the attacker makes an independent connection
between two victims and steals information to use fraudently.
a downgrade attack - can facilitate a MitM by requesting that the serves use a lower specification protocol with
weaker ciphers and key lengths.
Computer Bots - those computers that the attacker has infected with a backdoor exploit with a connection to
the C2 host or network. These bots can work individually or in unison.
Command & Control (C2 or C&C) - a host or network that can manage and control the various bots remotely.
a rainbow table attack - a password attack that allows an attacker to use a set of plaintext passwords and
their hashes to crack passwords. **passwords not "Salted" with a random value make the ciphertext
vulnerable to this type of attack.
Dictionary attack - when software enumerates values in a dictionary wordlist. Enforcing password complexity
makes passwords difficult to guess and copromise. Varying the characters in the password makes it more
resistant to these attacks.
A hybrid password - will target against naively strong passwords. The password cracking algorithm tests
dictionary words and names in combination with numeric prefixes and/or suffixes.
Potentially Unwanted Program (PUP) - also called potentially unwanted applications (PUA). Software installed
alongside a package or from a computer store that the user did not request
virus - Malware that is not necessarily hidden and very noticeable by virus scanners. These usually come in the
form of (.exe) or Dynamic-link Library (DLL) files.
[CLC website: Types of Malware]
[CERTMaster]
A lightweight directory access protocol (LDAP) injection occurs when an attacker exploits a client’s unauthenticated access to submit LDAP queries that could create or delete accounts, even change authorizations and privileges. LDAP uses port 389.
[CLC website]
Application and Service Attacks: