Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain One

Subdomain 1.2

Given a scenario, analyze potential indicators to determine the type of attack.

Terms: 34


Malware

Malicious software. Intended to damage or disable computers and computer systems.

Ransomware
Trojans

Worms
  1. Infected computer searches for a vulnerable system.
  2. Vulnerable computer is exploited.
  3. Backdoor is installed and downloads worm.
Potentially unwanted Programs (PUPs)
Fileless virus

Example:

  1. User clicks on malicious website link.
  2. Website exploits a flash/Java/Windows vulnerability.
  3. Launches PowerShell and downloads payload in RAM.
  4. Runs scripts and executables in memory, exfiltrates data, damages files.
  5. Adds an auto-start to registry.
Command and control
Bots
Botnet*

Cryptomalware
Logic bombs

Spyware
Keyloggers
Remote Access Trojan (RAT)


Rootkit
Backdoor

Password attacks

Malicious ways hackers attempt to gain access to an account. A common attack vector used to bypass or exploit authentication of user accounts. Include several different techniques.

Spraying
Dictionary

Brute force
Rainbow table

Example of a rainbow table using MD5 hash.

hash_hash hash_id hash_word
0cc175b9c0f1b6a831c399e269772661 1 a
92eb5ffee6ae2fec3ad71c777531578f 2 b
4a8a08f09d37b73795649038408b5f33 3 c
02129bb861061d1a052c592e2dc6b383 50 X
57cec4137b614c87cb4e24a3d003a3e0 51 Y
21c2e59531c8710156d34a3c30ac81d5 52 Z
Plaintext/unencrypted
Note: Regarding Hash and Salt

See subdomain 2.8

Physical attacks

A type of security attack that involves the use of physical devices to gain authorized access to a system or network. Can be in many forms, including malicious USB cables, flash drives, skimming, and card cloning.

Malicious Universal Serial Bus (USB) cable
Malicious flash drive

Card cloning
Skimming

Adversarial artificial intelligence (AI)

Tainted training data for machine learning (ML)
Security of machine learning algorithms

Supply-chain attacks

Cloud-based vs. on-premises attacks

Cryptographic attacks

You now have encrypted the data and sent it to another person - is it secure? These attacks focus on finding ways to undo security and locate cryptographic shortcomings.

Birthday

Collision
Downgrade

Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.