Attack Techniques | Hide and Seek | Phishing Scam Techniques | Hacky Activity | Notable Malware Attacks |
---|---|---|---|---|
What is Reconnaissance?
This technique can involve using OSINT as a starting point.
|
What is Encryption?
The purpose of this technique is to transform data in order to keep it secret from others.
|
What is Whaling?
These attacks work because executives often don’t participate in security awareness training with their employees.
|
What is a Penetration Test?
This is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
|
What is Stuxnet?
A political attack on Iran's nuclear program.
|
What is Password Spraying?
Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials and avoid detection.
|
What is Encoding?
This technique involves the use of code to change original data into a form that can be used by an external process.
|
What is Extortion?
The emails say there is an explosive device in your building and demands bitcoin in exchange for your life.
|
What is Vulnerability Scanning?
This is a type of assessment identifies weaknesses.
|
What is WannaCry?
People were turned away from hospitals globally during this ransomware attack.
|
What is Port Scanning?
The answer is this image.
|
What is Hashing?
This method can be used to provide a forensically sound piece of evidence.
|
What is Coercion?
The email threatens something bad will happen to your account unless you follow the instructions.
|
What is a Red Team?
The function of this is to test an organizations incident response team.
|
What is Heartbleed?
A buggy implementation of the RFC 6520 Heartbeat extension led to this attack.
|
What is CSRF?
This attack tricks a user into thinking they are visiting bank.com but really they are visiting evil.com.
|
What is Obfuscation?
This is used when trying to keep a secret.
|
What is Blackmail?
The emails say they hacked into your computer and recorded you visiting adult websites. They threaten to distribute the video to your friends and family within hours, unless you pay into their Bitcoin account.
|
What is Bug Bounty?
This activity gives a malicious actor an opportunity to become an ethical hacker.
|
|
What is Command and Control?
Once communication is established, the infected machine sends a signal to the attacker’s server looking for its next instruction.
|
What is Perfect Forward Secrecy?
It is a property of an encryption system that prevents an attacker that from decrypting past recorded sessions even after the private key of the server is leaked in the future.
|
|
|
|
|