in Technology by
What are the most common endpoint threats and attack technique?

1 Answer

0 votes
by

The most common endpoint threats and attack techniques are:

  • PORTABLE EXECUTABLES

    • Malware - Malicious software programs.

    • Packed Files/Polymorphism - Malware that has been modified to make it harder to identify.

    • Potentially Unwanted Applications (PUA) - Applications that are technically not malware, but they are not something you want to run on your machine (adware).


  • RANSOMWARE


    • File Encryptors - The most common type of ransomware, this encrypts the victim’s files and holds them to ransom.

    • Disk Encryptors and Wipers - Encrypts the victim's entire hard drive (not just the files) or wipes the hard drive completely.

  • DOCS AND SCRIPTS

    • Weaponized Documents - Typically, a Microsoft Office program that has been crafted or modified to cause damage.

    • Malicious Scripts - Malicious code often hidden in legitimate programs and websites.

Testing Checklist
  • EXPLOITS

    • Exploit-based Attacks - Attackers use techniques to take advantage of software bugs and vulnerabilities, to gain access and control a victim's computer.

  • ACTIVE ATTACKS

    • Credential Theft - Stealing authentication information to gain access to sensitive data.

    • Privilege Escalation - Methods used by attackers to gain additional access to a system.

    • Code Caves - Technique where attackers modify legitimate software to hide a malicious application.


  • FALSE POSITIVES

    • Anti-malware solutions may incorrectly identify legitimate software as malicious, impacting the end-user's ability to work.

Related questions

0 votes
    Which of these have been the most common and impactful attack over the last few years?...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    An attack technique that forces a user’s session credential or session ID to an explicit value 1. Brute Force Attack 2. Session Hijacking 3. Session Fixation...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    ________ is an attack technique occurs when excess data gets written to a memory block. (a) Over buffering (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is a non-technical type of intrusion or attack technique? (a) Reverse Engineering (b ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following threats is most likely to be caused by poor input validation? 1. Insecure direct object ... protection 3. Insecure cryptographic storage 4.Enabling of IPSec...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    Spyware is not a powerful & one of the most widespread threats on the internet. (a) True (b) False I ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    What are the common forms of the DOS attack?...
asked Feb 20, 2021 in Technology by JackTerrance
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    The most commonly used session hijacking attack is the _______________ (a) IP hacking (b) IP spooling (c) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    What are the most common IoT applications?...
asked Jan 18, 2023 in Education by JackTerrance
0 votes
    Can anyone tell me what are the most common types of Machine Learning tasks? Select the correct answer from above options...
asked Jan 11, 2022 in Education by JackTerrance
0 votes
    What are the most common credit metrics banks look at?...
asked Oct 10, 2020 in Credit by Editorial Staff
...