The practice of looking for a wireless network to exploit, more common in cars.
What is War Driving.
100
TACACS/TACACS+
What is Port 49.
100
Self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.
What is a Worm.
100
a Client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application
What is XSS or Cross Site Scripting
100
This is a complete inventory of who has handled specific items and where they have been stored.
What is chain of custody?
200
A WAP placed within a network by someone with some type of attack in mind.
What is a Rogue Access Point.
200
DNS
What is Port 53.
200
A string of code embedded into an application or script that will execute in response to an event.
What is a Logic Bomb.
200
A code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution
What is SQLi or SQL Injection
200
Legally taking equipment from someone who is under investigation.
What is evidence collection
300
Noise or radio signal transmitted on the same frequency used by wireless network, that can seriously degrade performance.
What is Interference.
300
SSH, SCP
What is Port 22.
300
Any malicious computer program which is used to hack into a computer by misleading users of its true intent.
What is a Trojan
300
A trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.
What is Brute Force
300
Term used for holding on to legally taken property for a lengthy time.
What is evidence preservation
400
Any unauthorized access to or theft of information from a Bluetooth connection.
What is Bluesnarfing.
400
TFTP
What is Port 69.
400
A type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
What is a rootkit
400
Intruders can request an alternative file be used in the specified request instead of the file meant to go along with the program.
What is Local File Inclusion.
400
A low level copy of a machine to ensure nothing is modified during copy
What is bit-level copy, mirror copy, etc.
500
The practice of sending text messages over someone else's Bluetooth device without the user's permission or knowledge.
What is Bluejacking.
500
POP3
What is Port 110.
500
A form of malware that essentially holds a computer system captive
What is ransomware?
500
A very sneaky method of running malicious software on a victim’s server is by simply asking it to go somewhere else on the Internet to find a dangerous script, and then run it from that location.
What is Remote File Inclusion
500
An umbrella term used to describe the practice of analyzing computers during an investigation