(Security+) Threats, Vulnerabilities, & Mitigations

Credential Replay Attack – Capture and replay credentials for malicious purposes. Accomplished by conducting an on path attack which captures credentials. Can be mitigated by employing session tokens.

DLL Injection Attack – injection of malicious code into windows dynamic link library (DLL) files which store shared code for multiple programs simultaneously. Mitigated by using fully qualified baths for DLLs instead of searching paths.

Cryptographic Collision Attack– Utilization of a vulnerability in a hash function to create a file with the same hash as a legitimate file. Usually used to hide malicious files from security checks that rely on hashing. Mitigated by using cryptographically sound hash functions.

BluesnarfingAct of extracting data from a Bluetooth device while it is within range.

Bluejacking – Sending unsolicited messages to Bluetooth devices within range.

Evil Twin Attacks – Utilization of a rouge access point which uses an identical SSID to a legitimate access point, usually used to perform on path attacks.

Insider Threat – Trusted user intentionally performing malicious actions, hard to detect in cases with privileged users. Usually motivated for blackmail purposes.

Disinformation – False information involves bots or users intentionally spreading false information.
Misinformation – False information shared unknowingly or without malicious intent.

Microsoft Intune – Cloud service for configuration management which replaced Endpoint Manager and SCCM.

TCP PORT 515 – Line Printer Remote port utilized for print services.

TCP Port 1433 – Microsoft SQL Server.

TCP Port 389 – (LDAP) Lightweight directory access protocol

TCP Port 636 – (LDAPS) Lightweight directory access protocol secure, uses TLS encryption between client and server, verified identity of both the client and the server, and ensures data is not tampered with in transit.

ACL – Access control list – used to segment networks based on port, protocol, IP address and more.

XSS – Cross site scripting – The act of inserting a script into a text area intended to be viewed by other users.

SQLi – SQL injection – Injection of SQL code into text areas intended to be viewed by users.

ClickjackingDeceiving users to clicking on unintended elements, think ads with pictures of download buttons next to the real one.

Reflected DDoS – Attacker sends requests to intermediary servers which then forward responses to the victim, amplifying the traffic volume.

Badge Cloning – RFID badges can be cloned by recording the data with software tools. Mitigating this can be done by requiring a PIN as a second factor of authentication.

Shadow IT – Insider that creates or modifies IT services without knowledge of the IT department.

Downgrade Attack – Involves requesting the use of weaker encryption algorithms which can be cracked.

Birthday Attack – Exploit the increased probability of finding a solution through nonlinear guesses rather than linearly progressing through the key space.

Leave a Reply

Your email address will not be published. Required fields are marked *